Discussion topic with well supported and outside research


From this Section is very Important

Responded to discussion topic with well supported and outside research or assigned readings as appropriate, add value to the discussion, and demonstrate student's understanding of concepts.

Reply

The Cyber-attack or the Cyber terrorism is becoming more dangerous and sophisticated from time to time. Countries are trying to do their best. From the conference, Mr. Robert attempted to explain about the balancing of the IT policy with the technology. Also, the Mr. Arthur explained what the responsibility of the government and trying to protect users from attackers and criminals. I agree the government is attempting to keep us safe from attackers. also, it is possible as Mr. Robert suggestion some bad Apple fruits in the government uses their power and authority to manipulate the data security even though the government is trying to do a good job. I also agree with his comments. It is true the main purpose of the government is serving and protecting its citizens; however, some government officers use their power to misguided the security system and protocol.

Reply needed 4

The information presented in the video was very informative and insightful. The first question that was brought up was; is there difference between cyber-crime, cyber-terrorism, and cyber-warfare? I believe what the panel expert was trying to say was; there is no difference in the way we should defend. However, there is a difference in the definition of each and that definition has not quite been defined to a level of understanding. However, one major point I believe the panel expert left out is while there is no difference to how we defend against these different attacks, there is a difference on how we respond. For example, if InfoSec crime group performs a cyber-attack the Pentagon, our legal response is to hunt down those criminals and prosecute. This is true no matter if we define the attack as a cyber-crime for monetary profit or cyber-terrorism which is for ideology profit. Furthermore, there is also a difference between cyber-warfare and cyber-espionage. The major difference is the effect and damage done. For instance, a nation state caught collecting sensitive data from the an opposing Prime Minister is significantly different than a nation state being caught maliciously causing safety protocols to fail on a dam. The first causes strained diplomatic relations and embarrassment the other could possibly cause significant damage and possible loss of life. Therefore, if the attack has been determined to be sourced from another nation state the response is significantly different from legal, diplomatic, or sanctions to a possible declaration of war (Bradley, 2012).

The second question posed, can analyst distinguish transaction signatures to predict a cyber-attack; and can this information be used to leverage a proactive cyber-defense vice a reactive one; and finally can this be done while protecting civil liberties and privacy of the population at large. The capability to analyze big data to determine who are the bad guys and good guys is classified.

We are unable to know exactly what our capabilities are in this realm. However, the challenge of government leveraging big data analytics in the use of proactively finding terrorist is not much different than the use of big data in the private sector. Think about it like this: both public and private organizations are trying to collect store, and interpret multiple streams of structured and unstructured data sets to gleam elements of data that would otherwise be unable to (Woodie, 2014).

Finding the individuals involved in organizations, like ISIS, can be difficult. It's not like there is roster or the members are paying dues. However data can be mined and processed using different analytical techniques. Using this information it should be fairly easy to determine who's supporting the group, who's feeding and financing them, and supplying it weapons. (Woodie, 2014). This potentially would allow the US government to proactively shut the support chain off, thereby starving the organization.
Works Cited
Bradley, T. (2012). When Is a Cybercrime an Act of Cyberwar? Retrieved from https://www.pcworld.com/article/250308/when_is_a_cybercrime_an_act_of_cyberwar_.html
Woodie, A. (2014, October 14). How Big Data Analytics Can Help Fight ISIS. Retrieved from https://www.datanami.com/2014/10/14/big-data-analytics-can-help-fight-isis/


Reply 5 needed
I don't have any professional work at this point. Though this does not mean, I am not capable to practice what I've studied in this course. Defiantly I will use my knowledge and training in practice in my future professional working area. It feels good and confident to become knowledgeable about the ethical issues that are incorporated into information technology. The knowledge I gathered will play an enormous part in my Cyber security bachelors. As a cyber-security graduate, I have to know more about different ethical issues and rules. In this course, I learned different technologies and their rules and how to implement in real life. After my graduation, my understanding will make my job easier to use the IT related ethics and values.
My plan is to finish my bachelor and spend the Spring by preparing myself to take different types of certificates while I am looking for a job. I am thinking to start from Security + certificate.
The assignments are not easy once, they are very challenging and time-consuming, and however, they helped me to dig deep for to research and to know a lot about it. I have one comment about the assignments; in the future can you open all the assignments at the beginning of the class. Some people want to finish the projects earlier or start ahead of time. I think it would be fantastic if you do that for the future. Thanks it was a great class!

Reply 6 needed
Professor Mills,
This course has been a wonderful learning experience. I must say that 6 papers in an 8 week period was a daunting task. However, your topics made the exercises fun to complete. Lastly, and most importantly, this class gave me the opportunity to complete a full assessment of a company's security issues. From identifying the problems to implementing security solutions, it gave real world examples that will assist me in my future job search endeavors. Thank you for a wonderful experience.
-SM

Reply 7 needed
I know that I'm early for this post but next week I will be extremely busy at work.

I don't have a lot of experience being interviewed. I have been in the same job now for almost 20 years so this will be a new experience for me. I can tell from asking questions to people I know what employers are seeking. They want a person that is confidant but not full of themselves. They must have some knowledge of the company and must show a interest in the work that they do. I once interviewed a person that was in IT and hated IT.
I should start interviewing soon and I can't wait for it to begin. I'm excited about the possibility's that exist for me and my family.

Lee
Reply 8

n a minimum of 150 words, Discuss your own post-interview experiences you've had (good or bad). Explain what you might do differently after having completed this course. Why? Be specific!
Have you experienced a reference gone bad? How did you find out? How did you handle it? Talk about other post-interview experiences and discuss lessons learned.
Review at least two other colleague's posts. Compare your peer's experiences with your own career and what lessons you learned in similar circumstances.
-----------

I had some post-interview experiences in the past that I could go back as far back as since after high school, with some interviews in some fast-food type of business, such as McDonalds and Burger Kings that I was hired effortlessly. However, those interview experiences with the fast-food type business is not as intense as I had getting interview by a group of people in a panel interview with FEMA Federal Emergency Management Agency. Not only was it a nerve-racking experience because the panel were composed of eight interviewers but also the location was too far from where I live: I drove almost two hours to get there. During the panel questioning interview, I was so nervous that my voice would not project properly and I was hyperventilating that resulted in an interview gone bad. Of course, I probably was not the right fit for the experience that they are looking for, and because I did not perform well during the interview, I did not get the job. For this reason, I was so frustrated especially the salary was very attractive and was amount was doubled to the annual pay to what I was making.

Definitely, after this course and with more interview practices, I should be more confident because I am now equipped with knowledge and tools that I need to succeed in the future interview sessions.

Solution Preview :

Prepared by a verified Expert
Other Subject: Discussion topic with well supported and outside research
Reference No:- TGS01728112

Now Priced at $30 (50% Discount)

Recommended (90%)

Rated (4.3/5)