Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the work

Syllabus

Week 1

 

 

Popescul, D. (2011, June).  The confidentiality–integrity–accessibility triad into the knowledge security. A reassessment from the point of view of the knowledge contribution to innovation . In Proceedings of the 16th international business information management association conference (innovation and knowledge management, a global competitive advantage) (pp. 1338-1345).

Dempsey, K., Pillitteri, V., & Regenscheid, A. (2021).  Managing the Security of Information Exchanges  (No. NIST Special Publication (SP) 800-47 Rev. 1 (Draft)). National Institute of Standards and Technology.   Marks, Cotter, D., Janz, A., Williams, K., & Sinapi, A. E. (2021).  CYBERSECURITY AND DATA PRIVACY Tort Trial & Insurance Practice Law Journal56(2), 303–.   Razaque, Al Ajlan, A., Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., Oad, A., Hariri, S., & Zhao, C. (2021).  Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System Applied Sciences11(17), 7880–.

 
Week 2

 

Margherita, A., & Heikkilä, M. (2021).  Business continuity in the COVID-19 emergency: A framework of actions undertaken by world-leading companies Business horizons64(5), 683-695.   Swanson, M., Bowen, P., Phillips, A. W., Gallup, D., & Lynes, D. (2010).  NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems Swanson, P. Bowen, AW Phillips, D. Gallup, D. Lynes.–2010.–149 p17.   Marcus Burger, L Murphy Smith, & Justin Wood. (2020).  RECENT CYBERCRIMES AND CYBERSECURITY STRATEGIES Internal Auditing35(1), 12–19.   Bayard. (2019).  THE RISE OF CYBERCRIME AND THE NEED FOR STATE CYBERSECURITY REGULATIONS Rutgers Computer & Technology Law Journal45(2), 69–.  
 

 

Week 3

 

 

   

BURKE, MCDONALD, J., & AUSTIN, T. (2000).  Architectural support for fast symmetric-key cryptography Operating Systems Review34(5), 178–189.   Diffie, & Hellman, M. (1976).  New directions in cryptography IEEE Transactions on Information Theory22(6), 644–654.   Ullah, de Roode, G., Meratnia, N., & Havinga, P. (2021).  Threat Modeling — How to Visualize Attacks on IOTA?  Sensors (Basel, Switzerland)21(5), 1834–.   Li, Yu, Y., Lou, C., Guizani, N., & Wang, L. (2020).  Decentralized Public Key Infrastructures atop Blockchain IEEE Network34(6), 133–139.   Chia, Heng, S.-H., Chin, J.-J., Tan, S.-Y., & Yau, W.-C. (2021).  An Implementation Suite for a Hybrid Public Key Infrastructure Symmetry (Basel)13(8), 1535–.  
 

Week 4

Ghazal, T. M., Hasan, M. K., Hassan, R., Islam, S., Abdullah, S. N. H. S., Afifi, M. A., & Kalra, D. (2020).  Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications Solid State Technol63(1s), 2513-2521.   Poyraz, Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020).  Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches Geneva Papers on Risk and Insurance. Issues and Practice45(4), 616–638.   Fausto, Gaggero, G. B., Patrone, F., Girdinio, P., & Marchese, M. (2021).  Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures Sensors (Basel, Switzerland)21(21), 6970–.  
Week 5

 

 

Hokeun Kim, Wasicek, A., Mehne, B., & Lee, E. A. (2016).  A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 114–122.   Cao, Jiang, X., Zhao, Y., Wang, S., You, D., & Xu, X. (2020).  A Survey Of Network Attacks On Cyber-Physical Systems IEEE Access8, 1–1.   Wang, Sun, L., & Zhu, H. (2020).  Defining Social Engineering in Cybersecurity IEEE Access8, 85094–85115.   Shi. (2020).  Computer Network Information Security Protection Based on Virtual Private Network Journal of Physics. Conference Series1646(1), 12121–.   Figueroa-Lorenzo, Añorga, J., & Arrizabalaga, S. (2019).  A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach Sensors (Basel, Switzerland)19(20), 4455–.   Penelova. (2021).  Access Control Models Cybernetics and Information Technologies : CIT21(4), 77–104  
Week 6 Caselli, M., & Kargl, F. (2014, October).  A security assessment methodology for critical infrastructures . In International Conference on Critical Information Infrastructures Security (pp. 332-343). Springer, Cham.   Ruan, Y. L., & Yan, X. Q. (2018).  Research on key technology of web application security test platform DEStech Transactions on Social Science, Education and Human Science, (emss).   External Security Audit Conduct A Detailed Objective Assessment Of Security Of Facilities And Buildings, Including Vital Installations At Landside Area Of The Kiab Airport Including But Not Limited To The Present Security Measures & Procedures And Conting . (2021). MENA Report.   Jevsejev. (2020).  INFORMATION TECHNOLOGY RISK ASSESSMENT METHODS AND IMPROVEMENT SOLUTIONS Science Future of Lithuania12, 1–7.   Gomez. (2019).  Proactive management of plant cybersecurity: A combination of information technology (IT) and operations technology (OT) cybersecurity expertise is required to manage the infux of Industrial Internet of Things (IIoT) devices and increased IT/OT integration Control Engineering66(2), 20–.  
Week 7

 

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020).  How integration of cyber security management and incident response enables organizational learning Journal of the Association for Information Science and Technology71(8), 939-953.   Ahmad, Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021).  Network intrusion detection system: A systematic study of machine learning and deep learning approaches Transactions on Emerging Telecommunications Technologies32(1).   Kennedy, Gonick, S. A., & Errett, N. A. (2021).  Are We Ready to Build Back “Healthier?” An Exploratory Analysis of U.S. State-Level Disaster Recovery Plans International Journal of Environmental Research and Public Health18(15), 8003–.   Back, & Guerette, R. T. (2021).  Cyber Place Management and Crime Prevention: The Effectiveness of Cybersecurity Awareness Training Against Phishing Attacks Journal of Contemporary Criminal Justice37(3), 427–451.   Brown. (2019).  Technologies and infrastructure: costs and obstacles in developing large-scale computer-based testing Education Inquiry10(1), 4–20  

 

Week 8

 

 

An Introduction to Cybersecurity Ethics . Published by the  Markkula Center for Applied Ethics  at Santa Clara University.   Hee Wan Kim. (2021).  A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code International Journal of Advanced Culture Technology(IJACT)9(4), 288–294.   Sungjoong Kim, Seongkyu Yeom, Haengrok Oh, Dongil Shin, & Dongkyoo Shin. (2021).  Automatic Malicious Code Classification System through Static Analysis Using Machine Learning Symmetry (Basel)13(35), 35–.   Srivastava, Gupta, S., Quamara, M., Chaudhary, P., & Aski, V. J. (2020).  Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects International Journal of Communication Systems33(12), e4443–n/a.

Order your essay today and save 10% with the discount code ESSAYHELP