Journal entry- week 8

As shown in the video we can see that the media greatly influences our understanding and perspective of cybersecurity. Most people who did not pursue cybersecurity, IT or even unethical hacking would not know right from wrong when it came to the correct terminology and how things actually worked in the world of cybersecurity. In…

Career Paper

By: Sarah Gantner CYSE-201S Fall 2023 The cybersecurity field is huge and forever growing, this is due to the influx of technology running our day-to-day lives like it never has before. Cybersecurity as a field is fairly new to our world. The first known idea of a cybersecurity career wasn’t until the late 1980s and…

Week 6 Journal Entry- Fake Websites

Fake websites are on the rise with the increased use of the internet in recent years. A ton of purchases are made via the internet than ever before. This is due to the convenience of an item coming straight to you and finding the best deal for that item. With the rise of internet shopping…

Maslow’s Hierarchy of Needs

By: Sarah Gantner  CYSE201S Fall 2023 Maslow’s hierarchy of needs separates different parts of emotional growth in people, and as they go through each stage they are motivated to become better and keep growing because of the levels they have already encountered. Each level while unique as a concept, all tie into each other when…

Journal Entry: Privacy Rights- Data Breaches

While looking into the privacy rights website I noticed while it doesn’t go into detail on the specific breaches that have occurred, it does have a running total of the known breaches in the US. The number alone was enough to make me pause in complete shock. In the past I have held positions that…

Journal Entry 1: NICE FRAMEWORK

When reviewing the NICE Workforce Framework, I would have to say a few categories do seem to catch my interest. I think the analytical aspect of the framework would fit well into my future careers as analysis of data and other processes is something I enjoy doing and could see myself becoming fulfilled in it….

Ethical Consideration of CRISPR Gene Editing

CRISPR is a revolutionary technology in the field of genetics that enables the precise editing of DNA sequences in living organisms. The potential applications of CRISPR are vast and include treating genetic diseases, improving crop yields, and creating new medicines. However, with any new technology comes a responsibility to consider its ethical implications. In the case of…

The Human Factor in Cybersecurity

As a chief information security officer, I would recognize that both training and additional cybersecurity technology are essential in addressing human contribution to cyber threats. However, with a limited budget, I would need to balance the tradeoff and allocate funds to maximize the impact of reducing cybersecurity risks. Here are some steps I would take…

SCADA Systems

Critical infrastructure systems, such as those used in transportation, energy, water supply, and communication, are vulnerable to cyber-attacks that could have disastrous consequences. The following are some of the vulnerabilities associated with critical infrastructure systems: SCADA (Supervisory Control and Data Acquisition) applications play a crucial role in mitigating these risks. These applications provide real-time monitoring…