This page includes all assignments, readings, reflections, photos, video journals, and free writes required for the course. The material is organized for clarity and demonstrates how I integrated academic knowledge with practical cybersecurity topics.
SECTION 1 — READINGS & WRITE-UP REFLECTIONS
Making the Most of Learning with Perusall
This reading introduced me to Perusall’s collaborative learning platform. I learned how highlighting, annotating, and interacting with classmates enhances comprehension. It taught me the importance of active reading, which became useful throughout the course.
Cyber Trends — Perusall Warm-Up
This practice assignment helped me get comfortable using Perusall. I explored major cybersecurity trends such as ransomware, phishing, social engineering, and the increasing sophistication of cyberattacks. This reading gave me a broad overview of modern cyber threats.
Exploring the Many Jobs in Cybersecurity
I learned that cybersecurity includes a wide range of careers: analysts, threat hunters, SOC specialists, cybersecurity lawyers, digital forensics experts, and more. It showed me the diversity of opportunities in the field and helped me think about my own future direction.
The IT Organization
This reading explained how IT departments are structured. I learned about teams such as operations, networking, security, and support. Understanding these roles helped me see how cybersecurity fits within a business.
Understanding the Components of a Business
This assignment introduced me to key business concepts such as revenue, operations, risk, strategy, and leadership. It showed how cybersecurity supports business goals and protects essential assets.
NIST Cybersecurity Framework – Version 2.0
I learned about the five core functions of the NIST CSF: Identify, Protect, Detect, Respond, and Recover. This framework is used by organizations around the world to build cybersecurity programs. Understanding it helped me see how cybersecurity is standardized and applied in real-world settings.
Cybersecurity, Technology & Society – Chapter 4: BioCybersecurity
This reading explored the merging of biological science and cybersecurity. I learned how DNA data, genetic databases, and laboratory tools can create new vulnerabilities when they become digitized.
Hacking Humans: Protecting Our DNA from Cybercriminals
This article highlighted the dangers of genetic data being stolen or manipulated. It introduced the idea that cyber threats now reach deeply into healthcare and biotechnology.
Malicious Code Written into DNA Infects the Computer That Reads It
One of the most interesting readings, this article explained how researchers embedded malware into synthetic DNA to exploit sequencing machines. It demonstrated how cybersecurity is expanding into unexpected fields.
Recent Attacks on Critical Infrastructure
This reading covered cyberattacks targeting hospitals, pipelines, power grids, and water systems. It helped me understand how critical infrastructure is vulnerable and why cybersecurity is essential to public safety.
Chapter 6 – Criminal Justice and Cybersecurity
I learned how cybersecurity intersects with law enforcement. This includes digital evidence, investigation processes, criminal justice challenges, and how cybercrimes are prosecuted.
CONCLUSION
CYSE 201S expanded my understanding of cybersecurity far beyond technology. I learned:
- How human behavior influences cyber risk
- How social sciences help explain cybercrime
- How organizations structure and protect information
- How emerging fields like biotechnology connect to cybersecurity
- How critical infrastructure depends on digital safety
This ePortfolio demonstrates my growth throughout the semester and the knowledge I will continue building in future cybersecurity classes.