Chat with us, powered by LiveChat etc pca | Gen Paper
+1(978)310-4246 credencewriters@gmail.com
  

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the work

Syllabus

Week 1

Popescul, D. (2011, June). 
The confidentiality–integrity–accessibility triad into the knowledge security. A reassessment from the point of view of the knowledge contribution to innovation
. In Proceedings of the 16th international business information management association conference (innovation and knowledge management, a global competitive advantage) (pp. 1338-1345).

Dempsey, K., Pillitteri, V., & Regenscheid, A. (2021). 

Managing the Security of Information Exchanges

 (No. NIST Special Publication (SP) 800-47 Rev. 1 (Draft)). National Institute of Standards and Technology.
 
Marks, Cotter, D., Janz, A., Williams, K., & Sinapi, A. E. (2021). 
CYBERSECURITY AND DATA PRIVACY
. Tort Trial & Insurance Practice Law Journal, 56(2), 303–.
 
Razaque, Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., Oad, A., Hariri, S., & Zhao, C. (2021). 
Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System
. Applied Sciences, 11(17), 7880–.

Week 2

Margherita, A., & Heikkilä, M. (2021). 
Business continuity in the COVID-19 emergency: A framework of actions undertaken by world-leading companies
. Business horizons, 64(5), 683-695.
 
Swanson, M., Bowen, P., Phillips, A. W., Gallup, D., & Lynes, D. (2010). 
NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems
. Swanson, P. Bowen, AW Phillips, D. Gallup, D. Lynes.–2010.–149 p, 17.
 
Marcus Burger, L Murphy Smith, & Justin Wood. (2020). 
RECENT CYBERCRIMES AND CYBERSECURITY STRATEGIES
. Internal Auditing, 35(1), 12–19.
 
Bayard. (2019). 
THE RISE OF CYBERCRIME AND THE NEED FOR STATE CYBERSECURITY REGULATIONS
. Rutgers Computer & Technology Law Journal, 45(2), 69–.

Week 3


 
 

BURKE, MCDONALD, J., & AUSTIN, T. (2000). 
Architectural support for fast symmetric-key cryptography
. Operating Systems Review, 34(5), 178–189.
 
Diffie, & Hellman, M. (1976). 
New directions in cryptography
. IEEE Transactions on Information Theory, 22(6), 644–654.
 
Ullah, de Roode, G., Meratnia, N., & Havinga, P. (2021). 
Threat Modeling — How to Visualize Attacks on IOTA?
 Sensors (Basel, Switzerland), 21(5), 1834–.
 
Li, Yu, Y., Lou, C., Guizani, N., & Wang, L. (2020). 
Decentralized Public Key Infrastructures atop Blockchain
. IEEE Network, 34(6), 133–139.
 
Chia, Heng, S.-H., Chin, J.-J., Tan, S.-Y., & Yau, W.-C. (2021). 
An Implementation Suite for a Hybrid Public Key Infrastructure
. Symmetry (Basel), 13(8), 1535–.

Week 4

Ghazal, T. M., Hasan, M. K., Hassan, R., Islam, S., Abdullah, S. N. H. S., Afifi, M. A., & Kalra, D. (2020). 
Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications
. Solid State Technol, 63(1s), 2513-2521.
 
Poyraz, Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020). 
Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches
. Geneva Papers on Risk and Insurance. Issues and Practice, 45(4), 616–638.
 
Fausto, Gaggero, G. B., Patrone, F., Girdinio, P., & Marchese, M. (2021). 
Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures
. Sensors (Basel, Switzerland), 21(21), 6970–.

Week 5

Hokeun Kim, Wasicek, A., Mehne, B., & Lee, E. A. (2016). 
A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities
. 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 114–122.
 
Cao, Jiang, X., Zhao, Y., Wang, S., You, D., & Xu, X. (2020). 
A Survey Of Network Attacks On Cyber-Physical Systems
. IEEE Access, 8, 1–1.
 
Wang, Sun, L., & Zhu, H. (2020). 
Defining Social Engineering in Cybersecurity
. IEEE Access, 8, 85094–85115.
 
Shi. (2020). 
Computer Network Information Security Protection Based on Virtual Private Network
. Journal of Physics. Conference Series, 1646(1), 12121–.
 
Figueroa-Lorenzo, Añorga, J., & Arrizabalaga, S. (2019). 
A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
. Sensors (Basel, Switzerland), 19(20), 4455–.
 
Penelova. (2021). 
Access Control Models
. Cybernetics and Information Technologies : CIT, 21(4), 77–104

Week 6

Caselli, M., & Kargl, F. (2014, October). 
A security assessment methodology for critical infrastructures
. In International Conference on Critical Information Infrastructures Security (pp. 332-343). Springer, Cham.
 
Ruan, Y. L., & Yan, X. Q. (2018). 
Research on key technology of web application security test platform
. DEStech Transactions on Social Science, Education and Human Science, (emss).
 

External Security Audit Conduct A Detailed Objective Assessment Of Security Of Facilities And Buildings, Including Vital Installations At Landside Area Of The Kiab Airport Including But Not Limited To The Present Security Measures & Procedures And Conting
. (2021). MENA Report.
 
Jevsejev. (2020). 
INFORMATION TECHNOLOGY RISK ASSESSMENT METHODS AND IMPROVEMENT SOLUTIONS
. Science Future of Lithuania, 12, 1–7.
 
Gomez. (2019). 
Proactive management of plant cybersecurity: A combination of information technology (IT) and operations technology (OT) cybersecurity expertise is required to manage the infux of Industrial Internet of Things (IIoT) devices and increased IT/OT integration
. Control Engineering, 66(2), 20–.

Week 7

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). 
How integration of cyber security management and incident response enables organizational learning
. Journal of the Association for Information Science and Technology, 71(8), 939-953.
 
Ahmad, Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). 
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
. Transactions on Emerging Telecommunications Technologies, 32(1).
 
Kennedy, Gonick, S. A., & Errett, N. A. (2021). 
Are We Ready to Build Back “Healthier?” An Exploratory Analysis of U.S. State-Level Disaster Recovery Plans
. International Journal of Environmental Research and Public Health, 18(15), 8003–.
 
Back, & Guerette, R. T. (2021). 
Cyber Place Management and Crime Prevention: The Effectiveness of Cybersecurity Awareness Training Against Phishing Attacks
. Journal of Contemporary Criminal Justice, 37(3), 427–451.
 
Brown. (2019). 
Technologies and infrastructure: costs and obstacles in developing large-scale computer-based testing
. Education Inquiry, 10(1), 4–20

Week 8


An Introduction to Cybersecurity Ethics
. Published by the 
Markkula Center for Applied Ethics
 at Santa Clara University.
 
Hee Wan Kim. (2021). 
A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code
. International Journal of Advanced Culture Technology(IJACT), 9(4), 288–294.
 
Sungjoong Kim, Seongkyu Yeom, Haengrok Oh, Dongil Shin, & Dongkyoo Shin. (2021). 
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning
. Symmetry (Basel), 13(35), 35–.
 
Srivastava, Gupta, S., Quamara, M., Chaudhary, P., & Aski, V. J. (2020). 
Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
. International Journal of Communication Systems, 33(12), e4443–n/a.

error: Content is protected !!