Demonstrate students understanding of concepts

Assignment Help English
Reference no: EM131325462

From this Section is very Important

Responded to discussion topic with well supported and outside research or assigned readings as appropriate, add value to the discussion, and demonstrate student's understanding of concepts.

Reply

The Cyber-attack or the Cyber terrorism is becoming more dangerous and sophisticated from time to time. Countries are trying to do their best. From the conference, Mr. Robert attempted to explain about the balancing of the IT policy with the technology. Also, the Mr. Arthur explained what the responsibility of the government and trying to protect users from attackers and criminals. I agree the government is attempting to keep us safe from attackers. also, it is possible as Mr. Robert suggestion some bad Apple fruits in the government uses their power and authority to manipulate the data security even though the government is trying to do a good job. I also agree with his comments. It is true the main purpose of the government is serving and protecting its citizens; however, some government officers use their power to misguided the security system and protocol.

Reply needed 4

The information presented in the video was very informative and insightful. The first question that was brought up was; is there difference between cyber-crime, cyber-terrorism, and cyber-warfare? I believe what the panel expert was trying to say was; there is no difference in the way we should defend. However, there is a difference in the definition of each and that definition has not quite been defined to a level of understanding. However, one major point I believe the panel expert left out is while there is no difference to how we defend against these different attacks, there is a difference on how we respond. For example, if InfoSec crime group performs a cyber-attack the Pentagon, our legal response is to hunt down those criminals and prosecute. This is true no matter if we define the attack as a cyber-crime for monetary profit or cyber-terrorism which is for ideology profit. Furthermore, there is also a difference between cyber-warfare and cyber-espionage. The major difference is the effect and damage done. For instance, a nation state caught collecting sensitive data from the an opposing Prime Minister is significantly different than a nation state being caught maliciously causing safety protocols to fail on a dam. The first causes strained diplomatic relations and embarrassment the other could possibly cause significant damage and possible loss of life. Therefore, if the attack has been determined to be sourced from another nation state the response is significantly different from legal, diplomatic, or sanctions to a possible declaration of war (Bradley, 2012).

The second question posed, can analyst distinguish transaction signatures to predict a cyber-attack; and can this information be used to leverage a proactive cyber-defense vice a reactive one; and finally can this be done while protecting civil liberties and privacy of the population at large. The capability to analyze big data to determine who are the bad guys and good guys is classified.

We are unable to know exactly what our capabilities are in this realm. However, the challenge of government leveraging big data analytics in the use of proactively finding terrorist is not much different than the use of big data in the private sector. Think about it like this: both public and private organizations are trying to collect store, and interpret multiple streams of structured and unstructured data sets to gleam elements of data that would otherwise be unable to (Woodie, 2014).

Finding the individuals involved in organizations, like ISIS, can be difficult. It's not like there is roster or the members are paying dues. However data can be mined and processed using different analytical techniques. Using this information it should be fairly easy to determine who's supporting the group, who's feeding and financing them, and supplying it weapons. (Woodie, 2014). This potentially would allow the US government to proactively shut the support chain off, thereby starving the organization.
Works Cited
Bradley, T. (2012). When Is a Cybercrime an Act of Cyberwar? Retrieved from https://www.pcworld.com/article/250308/when_is_a_cybercrime_an_act_of_cyberwar_.html
Woodie, A. (2014, October 14). How Big Data Analytics Can Help Fight ISIS. Retrieved from https://www.datanami.com/2014/10/14/big-data-analytics-can-help-fight-isis/


Reply 5 needed
I don't have any professional work at this point. Though this does not mean, I am not capable to practice what I've studied in this course. Defiantly I will use my knowledge and training in practice in my future professional working area. It feels good and confident to become knowledgeable about the ethical issues that are incorporated into information technology. The knowledge I gathered will play an enormous part in my Cyber security bachelors. As a cyber-security graduate, I have to know more about different ethical issues and rules. In this course, I learned different technologies and their rules and how to implement in real life. After my graduation, my understanding will make my job easier to use the IT related ethics and values.
My plan is to finish my bachelor and spend the Spring by preparing myself to take different types of certificates while I am looking for a job. I am thinking to start from Security + certificate.
The assignments are not easy once, they are very challenging and time-consuming, and however, they helped me to dig deep for to research and to know a lot about it. I have one comment about the assignments; in the future can you open all the assignments at the beginning of the class. Some people want to finish the projects earlier or start ahead of time. I think it would be fantastic if you do that for the future. Thanks it was a great class!

Reply 6 needed
Professor Mills,
This course has been a wonderful learning experience. I must say that 6 papers in an 8 week period was a daunting task. However, your topics made the exercises fun to complete. Lastly, and most importantly, this class gave me the opportunity to complete a full assessment of a company's security issues. From identifying the problems to implementing security solutions, it gave real world examples that will assist me in my future job search endeavors. Thank you for a wonderful experience.
-SM

Reply 7 needed
I know that I'm early for this post but next week I will be extremely busy at work.

I don't have a lot of experience being interviewed. I have been in the same job now for almost 20 years so this will be a new experience for me. I can tell from asking questions to people I know what employers are seeking. They want a person that is confidant but not full of themselves. They must have some knowledge of the company and must show a interest in the work that they do. I once interviewed a person that was in IT and hated IT.
I should start interviewing soon and I can't wait for it to begin. I'm excited about the possibility's that exist for me and my family.

Lee
Reply 8

n a minimum of 150 words, Discuss your own post-interview experiences you've had (good or bad). Explain what you might do differently after having completed this course. Why? Be specific!
Have you experienced a reference gone bad? How did you find out? How did you handle it? Talk about other post-interview experiences and discuss lessons learned.
Review at least two other colleague's posts. Compare your peer's experiences with your own career and what lessons you learned in similar circumstances.
-----------

I had some post-interview experiences in the past that I could go back as far back as since after high school, with some interviews in some fast-food type of business, such as McDonalds and Burger Kings that I was hired effortlessly. However, those interview experiences with the fast-food type business is not as intense as I had getting interview by a group of people in a panel interview with FEMA Federal Emergency Management Agency. Not only was it a nerve-racking experience because the panel were composed of eight interviewers but also the location was too far from where I live: I drove almost two hours to get there. During the panel questioning interview, I was so nervous that my voice would not project properly and I was hyperventilating that resulted in an interview gone bad. Of course, I probably was not the right fit for the experience that they are looking for, and because I did not perform well during the interview, I did not get the job. For this reason, I was so frustrated especially the salary was very attractive and was amount was doubled to the annual pay to what I was making.

Definitely, after this course and with more interview practices, I should be more confident because I am now equipped with knowledge and tools that I need to succeed in the future interview sessions.

Reference no: EM131325462

Questions Cloud

Compare rate of success of project in it and other industry : Describe the general role of a project manager, and explain the primary ways in which it differs across different industries. Compare the rate of success of projects in IT and other industries.
Functions when glucose levels are low and lactose levels : 1. Describe how the lac operon functions when glucose and lactose levels are high. 2. Describe how the lac operon functions when glucose levels are low and lactose levels are high.
Discuss about the swot analysis : During the analysis stage, you consider external factors that pose possible threats to or provide opportunities for your organization and compare these factors against your HCO's internal operation to diagnose its strengths and weaknesses. Many HC..
Count the current price in determining the average : Determine the price of an average price Asian call option. Use an exercise price of 95.- Count the current price in determining the average.
Demonstrate students understanding of concepts : Discussion topic with well supported and outside research or assigned readings as appropriate, add value to the discussion, and demonstrate student's understanding of concepts.
Describe how sex is determined in humans : Please Help me with these questions: 1. Describe how sex is determined in humans 2. Describe what sex linkage is and give an example
Calculate the value of your selected barrier option : Calculate the value of your selected barrier option and use it with the results you obtained in part a or b to determine the price of a standard European call or put.
Evaluation process for team members : As part of your plan, create a communications skills evaluation process for team members. In other words, how would you evaluate each team member's communication skills
Compare the performance of the two quantizers : Use the two quantizers to quantize the Sinan image. Compare the two quantizers using either the mean squared error or the SNR and the reconstructed image. Compare the difference between the performance of the two quantizers with the difference whe..

Reviews

Write a Review

English Questions & Answers

  How to prepare and present an informative speech

After you have brainstormed aspects of your speech,write a delivery outline of your informative speech about how to prepare and present an informative speech.-

  Leonardo, the renaissance master

"Leonardo, the Renaissance Master" Please respond to the following, using sources under the Explore heading as the basis of your response:

  Discuss nature as a source of instruction and delight

Discuss nature as a source of instruction, delight, and nourishment for the soul; return to nature as a source of inspiration and wisdom; life in nature often contrasted with the unnatural constraints of society.

  Analyzing essays that offer solutions to problems

Read the three essays in Chapter 11 (The Nursing Crisis, The Solution Lies Within, An Open Letter to the Community, and Request for a Work Schedule Change). Analyze the arguments and compare the effectiveness of their thesis statements, proposed ..

  What was the central idea of presentation

What was the central idea of this presentation? What sources did the speaker orally cite if any? How would you evaluate the speaker's vocal variety?

  Why does daoud lie to paul by telling him

Why does Daoud lie to Paul by telling him that if he agrees to eat, the commanders will let him call his wife back in the United States?

  Proposal to the student council

A plan to clean up the neighborhood around the school or college. From time to time there have been complaints from residents on neighboring streets that the students drop gum and candy wrappers, looseleaf pages, cigarette packs and butts, and so on,..

  How does chopin uses the idea of desire

How does Chopin uses the idea of desire and the significance of this emotion on the characters in this story?

  Write review of the american literature study guide

Write review of the American Literature Study Guide. In class discussions, express your own ideas and do not use outside sources. Using outside sources can lower your scores, and often they can lead to plagiarism.

  Demonstrate logical and creative thinking

Demonstrate logical and creative thinking

  Developing a positive classroom climate

Requirements : Apa format 12 font double dpace , cites ,references,cover page. Please coipy and paste each question prior to anbswering question Each question must be at least 3-3 paragraphs miminium! Anwer each throughly as directed.

  Research topics with explanation

This paper has been divided into 5 parts. The first part is neeed by July 14th, the second part needed by July 21st, the third part is needed by July 31st, the fourth part is needed by August 7, and the 5th and final part is needed by August 14. ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd