Chief information security officer
Yearningly taking the time to build businesses strategy/action plans
Being the point of contact when an attack hits
Experience in the field. Having experience will allow more job opportunities
Rent out property to companies
Selling Cybersecurity labor services
Expert in skills that are in most demand regarding cybersecurity
Certifications relating to IT/Cybersecurity
Understanding the role of Cybersecurity
Recovery after a hack can cost a company a lot of money
Investing
Training and educating on hacks, viruses to potentially prevent them from happening.
Yak shaving
Feb 23
Legal ways to make money in cybersecurity
Feb 23
How does your major relate to cybersecurity technology?
Cybersecurity is my major. I have always had a love for technology and how advanced we are getting in todays world. What interested me about Cybersecurity is how and what they do. Protecting computer systems and electronic data is important within a business and our government. If valuable information gets into the wrong hands it can cause major damage to people, and businesses. People are finding new ways on how to hack, attack, and manipulate information. I want to be able to help in preventing that from happening and that is why I chose Cybersecurity as my major.
Feb 23
Googling My Own Name
When I googled my name as “Isis Jordan” nothing comes up with my personal information. All information and sites that show are sites regarding the terrorist group “ISIS” and how the country Jordan is their next target. But what I found interesting is when I type my full name into google “Isis Danielle Jordan” the link that popped out to me was a website called Spokeo. This site had my full name, my parents names, and my brother. The site also showed that I live in Moyock, North Carolina and also showed a GPS image of my house. Not only does it show almost all my personal information on where I live, but people are able to subscribe the the site for a monthly charge of .95 cents and are able to access full personal details, phone number, pictures, online profiles, GPS location, background history, family history.
This is all crazy to me, I never think of just googling myself to see the information I could find due to the fact of my name and what is currently going on with the terrorist group.
Feb 23
Cyber security program in small businesses
Name: Isis Jordan
Date: February 13, 2019
Details
Small businesses are essential to our current economy. They are constantly growing, and at the moment there are a total of twenty-eight million small businesses in the United States alone. With all the small businesses, they play an imperative role not just in our economy, but also in the cyber infrastructure.
With small businesses being important to our economy, that does not mean they are not prone to being cyber attacked. They are what attackers consider “soft targets”, because small businesses may not have the extra funds to afford cyber security and information security due to its rising cost. They should look at investing in some sort of Information security for their business. Information security is protecting important information from all unauthorized users, protecting information from any unknown changes, and lastly protecting any disruptions on how information is accessed. Confidentiality, Integrity, and availability is what information security focuses on.
Small Businesses take a much harder hit if they are attacked than bigger organizations. If attacked then they would have to take action, which can become very costly. Which is why they should be more prepared to prevent any attacks or secure their information properly. Having a durable information security program in place can help a business with keeping employees, keeping customers and gaining future customers. All customers who put their trust in small businesses have an automatic expectation that their delicate information is secured and won’t be manipulated by a cyber-attack. By protecting a customer’s information, it shows how much their worth is to the business and shows the exceptional customer service the business provides to the customers.
With the constant growing cyber security threats today, a cyber security strategy should include training employees properly, protect vital information, building a firewall for internet connections, creating an action plan, creating user accounts for every employee, securing wi-fi networks, limiting employee access to information, and password and authentication.
Small Businesses should make an attempt to include Information security in budget. The cost of a cyber-attack can average a small business anywhere from $100,000 to $500,000, and that does not include revenue that has been already lost. This can also cause them to go out of business if the loss cannot be recovered from. If the proper precautions were taken, then a Cyber- attack may not have affected them as hard or could have been prevented from the start.
References
Security Now,About STTR | SBIR.gov,
Paulsen, Celia, and Patricia Toth. Small Business Information Security: The Fundamentals, 2016.
Majority of Cyber Attacks Against Small Businesses Can Cost $500K.”
www.sbir.gov/tutorials/cyber-security/tutorial-1.
Feb 23
Cyber Security Engineers Role
Name: Isis Jordan
Date: February 10, 2019
Details
Every day our society constantly relies on our computers and other electronic devices we use every day and in our workplace. Our world constantly continues to revolve around computers and the hardware and software within it. With social media growing it has also become a potential security threat, because terrorist is able to reach internationally and impact any individual using social media, their email, and any other social media platform. This can also play a giant role in organizations if an internal employee uses their work computer for their personal online activities and can put their work system at risk for cyber threats. All organizations that have faulty software leaves the networks defenseless to any possible malware and cyber-attack. The engineers in IT security field help protect all the organizations computers, software, hardware, and also their networks from any potential security risk, and that also includes malware. Engineers in IT not only help with preventing any cyber-attacks, but they also help and overlook a company’s security foundation and infrastructure and help make any changes that need to be made to help improve in the prevention of any possible cyber threats in the cyber security department. With the increasing risk in cyber security it is important for the IT engineers to develop a safe and secure environment for the organization. There are many requirements for the engineers to have, they must be able to accurately troubleshoot, identify the problem and threat, and be able to successfully provide proper solutions for the organizations network and systems. Also monitor systems, installing fitting software, reporting findings, planning and strategizing, education and training, and improving any technical systems. The engineer’s main primary objective is to protect all networks and computer systems and monitoring all systems. When cyber-attacks are not present, they are able to keep busy with the other day to day task available. Engineers in the IT department have many different titles like application security engineers, web security engineers, IT security engineers, and data security engineers. But no matter the different title they are given they all play important roles in our cyber security world.
References
Field Engineer – Engineers, Field Engineer
IT Security Operations Engineer.”www.fieldengineer.com/skills/it-security-operations-engineer.
Electric Grid Security and Resilience–Establishing a Baseline for AdversarialThreats.pdf.”, Google, drive.google.com/file/d/1OKiTYuCPwkHu4r04BME-
Feb 23
Staying ahead of Cyber Security
Name: Isis Jordan
Date: February 2, 2019
Details
Over the years the advancement of technology has sky rocketed and the use alone of the online world has increased. From the way we communicate with each other using our handheld devices and computers, or even the applications we use on our phones, tablets, computers, and any other devices that are able to access the internet and or the online social sites we use also has grown. Also, the way people are able to conduct business from starting a new one or improving their current one can increase their business by the promotion of using the internet. The way our society is advancing is requiring technology to advance at the same or even faster rate. We demand more out of our technology and companies are doing their best to keep up with the constant wants and needs of the society. “About 50 billion devices will be connected to the internet in 2020, most of them barely protected, a fact that implies as many potential doors for hackers to intrude in our devices, our companies, our homes and personal lives” (Ommeren). But if there were not set rules and regulations to help keep certain information and data protected and safe then what is the point of security. If there was no security, then there would be open access to people’s personal information. Banking would be exploited, also identity theft would be huge. Personal information and location services would be exposed to potentially criminals or people wanting to access that information. There has to be rules and regulations to help aren’t in the security of the online world, with the number of hackers trying to do damage to major companies, our government, and innocent civilians we have to have security. And without cyber security to fight off hackers, viruses then the internet would be an unsafe world. “The cyber security game will not have an end, and there will be no definite winners and losers, but that end can be replaced with the persistent pursuit of strategic advantage, a rebalancing of the equation between attacker and defender” (Ommeren).
References
Ommeren, Erik Van, et al. Staying Ahead in the Cyber Security Game . Sogeti and IBM, 2014.
Feb 23
What is Framework
Name: Isis Jordan
Date: January 27, 2019
Details
When reading the “Framework for improving Critical infrastructure Cybersecurity” by the National Institute of Standards and Technology it simply explains how important and useful framework is to the United states. Also, how it is so reliable to our very own infrastructure. Giving the ability to the United States to detect, prevent, and respond accordingly to any cyber-attacks that come their way. And that is very important because it helps keep top secret information safe, and or to relate to businesses, it helps keep their information safe. Framework can be effective across the board and help aid in various technological innovations. “The framework is not a one size fits all approach to managing cybersecurity risk for infrastructure, Organizations will continue to have their own unique risk with different threats, vulnerabilities, and risk tolerances” (Framework). Framework does have a “core”. And also has core functions. There are five of these function’s and they are Identify, Protect, Detect, Respond, and Recover. To identify, it is the organization or business understanding the resources provided that help prioritize the strategy. Protect is for the support or control to contain and prepare for any cybersecurity attack. Detect is to be able to catch any cybersecurity or enable one from happening within a timely manner. Respond is the appropriate way to take action against a cyber-attack happening and containing any incident. Last but not least is Recover, and this is for there to be a plan on if and when an attack happens how will the company recover from it and to help reduce what has already happened and the impact of the situation. All of these are the core of framework and help aid in cyber security attack preventions. They almost act as steps to take when one is happening and how to properly handle a situation. Being able to detect, then protect, and recovering after are very important within and outside of any organization, business, and our own US government.
References
Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0.” 2014, doi:10.6028/nist.cswp.02122014
Feb 18
A Brief Overview of the current threat landscape
Name: Isis Jordan
Date: January 12, 2019
Details
Most people do not understand the importance of Cybersecurity. When on social media they openly share their Name, age, DOB, phone number, and sometimes even their home address. That makes it easy for people in the hacking world to access their information. Facebook is a good example. People think it is a secured site, but I know when I am looking up something on the internet to shop, and when I go on Facebook ads are constantly popping up showing the product, I looked at previously. That is something that catches the user’s attention and then can become a click bait. With that can launch a faulty site to release a software that could potential take over the user’s computer to gain access to any personal information, and to even cause damage to the user’s computer. Also is why applying or downloading a virus protection to your laptop is important to prevent hackers from gaining access to personal information. But hackers can gain access easily from many other things. Inside attacks is a big problem. Someone that works inside a secured facility or has any administrative access to valuable information can be a huge problem. Especially when that person misuses their access to gain control. I have witnessed this before first hand when working for a small company. It can affect anyone who has given the company their personal information and that includes their personal address, phone numbers, and even their social. Because once the internal person is able to access personal files, they can manipulate the information to gain from, and that can be in any form to benefit them like access to more money. Also, with the company I was with an ex-employee still had access to the system and from there they were able to gain everyone in my departments emails to email us about how and why they got fired and continued to threaten the manager of the department. That also shows how easily an ex-employee can access and threaten the company if their credentials are not taken away immediately after being terminated. Cyber threats lie everywhere, and people do not realize how easy it can be to be hacked. But need to take the proper preclusions to prevent it as much as possible whether it be for personal or business use.
References
Tutorial 2: Introduction to Cyberthreats.”
About STTR | SBIR.gov, www.sbir.gov/tutorials/cyber-security/tutorial-2.
- 1
- 2