Assessing the Effectiveness of the NIST Cybersecurity Framework

            In today’s digital environment, a single cyberattack can shut down a hospital, stop business, or leak sensitive personal information. That is why the NIST Cybersecurity Framework (CSF) is an important tool. It helps organizations understand and manage their cybersecurity risks. This paper explains how to assess the CSF’s effectiveness by looking at expert opinions,…

Week 15 – Journal Entry 15

Getting to Know a Digital Forensics Career My understanding of digital forensics was significantly changed by a TEDx talk presentation.  The speaker (Bill Burnett) is a digital forensics investigator. Shared his story of how he happened to fall into this line of work by accident. Even though he was originally trained as an accountant. His…

Week 13 – Journal Entry 14

Five Most Serious Internet Offenses From the list of infractions provided on the site by Andriy Slynchuk, I believe the following are the most frequently infringed without realizing they are prohibited. Using unofficial streaming and torrent sites to pirate content directly violates copyright laws and threatens producers’ livelihoods. Unauthorized use of copyrighted photographs violates intellectual…

Week 11 – Journal Entry

Cybersecurity Analyst Job and Social Behaviors The video provides an overview of the cybersecurity analyst role, emphasizing its importance in protecting networks from assaults and breaches. Given the ever-changing nature of cyber dangers, key social issues include the need for adaptability and continual learning. It emphasizes the role’s demand across multiple industries, providing chances for…

Week 1 – Journal Entry

NICE Workforce Framework The NICE Workforce Framework provides a comprehensive perspective on the workforce in the field of cybersecurity, which covers a wide range of specializations. The sections under “Protect and Defend,” which concentrate on the implementation and management of security measures, and “Analyze,” which involve an in-depth investigation of cyber risks, are very intriguing…

The Role of Social Science in the work of Cybersecurity Analysts

IntroductionCybersecurity analysts are very important for keeping companies’ digital assets safe from cybercrime. But their job requires more than just technical know-how. They also need to understand how people act, how societies work, and how cyber threats fit into a larger social context. This essay looks at how cybersecurity experts use ideas from social sciences…

Week 10 ­- Journal Entry

Social Media Disorder Scale As someone who doesn’t use social media, I didn’t personally score myself on the Social Media Disorder Scale. However, reflecting on the likely items included in the scale—such as time spent on social media, the emotional impact of not accessing it, and its effects on daily responsibilities—it’s clear that these measures…

Week 8 – Journal Entry

Media Influences on Cybersecurity Understanding I think the media portrays cybersecurity and its significant impact on public perceptions. Hacking depictions in films and television shows frequently exaggerate the speed and ease with which hackers can circumvent security measures, prioritizing entertainment over accuracy. These depictions tend to oversimplify the nature of cybersecurity, portraying hackers as either…

Week 7- Journal Entry

Human-centered Cybersecurity Framework Photo Scenario: An individual staring intently at a computer screen with a puzzled expression. Meme Concept: Caption it with, “When you’ve changed your password too many times and can’t remember the latest one.” Human-Centered Cybersecurity Relation: Highlights the challenges of password management and the need for user-friendly authentication methods that enhance security…

Week 6 – Journal Entry

Spotting Fake and Real Websites Real: Amazon.com has security control in place, correct URL spelling, and detailed contact information. Fake: amaz0n.shop may have a similar design but uses a URL that is very closely like the real one, lacks security they used HTTP, and provides unclear contact information. 2. Bank of America (real) vs. BankofAmerica.financial…