Analytical Paper: Technology & Society

Summary This paper will look at three essential parts of cyber security. The first is the Chief Information Security Officer (CISO) and the integral part they play in any organization they are a part of. Secondly, we will look at Supervisory Control and Data Acquisition (SCADA) systems and how they can deter vulnerabilities within your…

Write-Up #3: Chief Information Security Officer Allocating Funds with a Limited Budget.

BLUF A Chief Information Security Officer is a leader who “establishes the right security and governance practices and enables a framework for risk-free and scalable business operations in the challenging business landscape” (Raza, 2020). As Chief Information Security Officer, I would prioritize protecting the company’s sensitive data and assets from cyber-attacks. They are effectively balancing…

Write-Up #2: Critical Infrastructure System Vulnerabilities and The Role SCADA Applications Play in Mitigating These Risks.

BLUF Critical infrastructure systems are in place to help with the functionality of society, such as water treatment facilities, communication networks, and power plants. Supervisory Control and Data Acquisition (SCADA) systems are computer-based control systems that monitor and control industrial processes and manage and control Critical infrastructure systems. However, the systems have become more vulnerable…

Write-Up #1: The CIA Triad and Authentication vs. Authorization

The CIA triad is an information security model consisting of three parts: Confidentiality,Integrity and Availability. This write-up describes the three and describes the differencesbetween Authentication and Authorization. Confidentiality, Integrity, and Availability Confidentiality means keeping information from being shared without permission or landing inthe wrong hands. Integrity refers to correct and complete information that can’t change…

Career Paper: Cybersecurity and Computer Forensic Analyst

Technology has become a staple in conducting any business and function in today’s world. With the rise in technology also comes the rise of malicious actors, those who would use your technology against you to potentially collect vital information, lock you from your information or systems, and much more. As technology increases, so does the…

Journal Entry #15: Digital Forensics | Davin Teo | https://www.youtube.com/watch?v=Pf-JnQfAEew Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

After watching the TED talk video of Davin Teo sharing his insight on the Digital Forensic career field and his journey into it, I was enthusiastic because I am highly interested in this career. Digital forensic investigators are skilled in electronic devices, collecting and analyzing data, and using digital evidence tools to help them solve…

Journal Entry #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Andriy Slynchuk’s article “11 illegal things you unknowingly do on the Internet” highlights illegal things that people do on the Internet that are common. The five that I think are the most serious are collecting information about children, faking your identity online, sharing passwords, addresses, or photos of others, bullying and trolling, and using unofficial…

Journal Entry #13: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The letter provides customers with information about a data breach that took customer information like their address, phone number, and credit and debit card information. The letter can relate to economic and social science theories impacting businesses and customers. Two economic theories are Marxian and rational choice theory. Marxian economic theory is that those with…

Journal Entry #12: Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies. Focus primarily on the literature review and the discussion of the findings.

The article “Hacking for Good: Leveraging Hacker One Data to Develop an Economic Model of Bug Bounties” by Kiran Sridhar and Ming Ng provides exciting insights into the economic principles and benefits of bug bounty policies. Bug bounty policies pay individuals to identify vulnerabilities in a company’s cyber infrastructure by allowing ethical hackers to conduct…

Journal Entry #11: As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

In the video, “What does a Cybersecurity Analyst Do? Salaries, Skills, & Job Outlook,” Nicole Enesse does a great job giving an overview of Cybersecurity positions, where they are located, skills, salaries, and much more. Based on these job descriptions, understanding social behaviors would be highly beneficial when working in this field. Some social behaviors…