Analytical Paper/Final Write up

Nathan Guman CYSE200T_32776 Cybersecurity, Technology & Society Professor Duvall April 22, 2025 CIA triad: Reinforcing the Foundations of our Cyber World BLUF: The CIA Triad – Confidentiality, Integrity, and Availability – represents the core principles and foundation of information security in our modern age. By examining the social, ethical and business implications these principles have…

CYSE 200T SCADA System assignment

Nathan Guman 202420_SPRING_CYSE200T_32776 CYSE-200T – Cybersecurity, Technology & Society SCADA systems write up Due Wed Mar 26, 2025 11:59pm TASK: In this write-up you will use the SCADA SystemsLinks to an external site. article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these…

CYSE 200T AI Assignment 1: What to do with Cybersecurity?

Nathan Guman202420_SPRING_CYSE200T_32776CYSE-200T – Cybersecurity, Technology & SocietyAI assignment 1Due Wed Feb 16, 2025 11:59pmTASK:Use Microsoft Word for this assignment.In this assignment, you will go to your favorite AI tool, Chat GPT, Gemini, CoPilot, or others, and examine the differences between the previous 1.1 version of the NIST Cybersecurity FrameworkLinks to an external site. and the…

CYSE 200T The CIA Triad

Nathan Guman CYSE 200T February 15, 2025 Information Security Core Principles BLUF: Confidentiality, Integrity, and Availability (CIA) are the core principles that form the foundation of information security. Authentication and Authorization are vital principles that complement and strengthen the CIA triad, ensuring that data remains secure, protected, and accessible only to the right individuals. “The…

Career Paper

202310_CYSE201S_24153 CYBERSECURITY & SOCIAL SCIENCE Cyber Security and Social Science Nathan Guman Carrer Paper Introduction: According to the US Commerce Department’s Bureau of Economic Analysis, the digital economy accounted for 10.3% of US GDP, or 2.4 trillion dollars in 2021, with an average growth rate of 6.7% over the last 5 years (BEA). The internet…

Journal Entry 15

Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 15 Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. The video was a TED talk given by David Teo…

Journal Entry 14

Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 14 Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Of the 11 items listened in the…

Journal Entry 13

Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 13 A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the…

Week 12 Journal Entry

Nathan Guman CYSE 201S Cyber Security and Social Science Week 12 Journal Entry Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The sample breach letter highlights an excellent contrast between lasses-fare theory and rational choice theory….

Journal entry 11

Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 11 Watch this video https://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. , think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. Cybersecurity analyst is a varied job with many different…