journal

Cybersecurity risk management plays a critical role in safeguarding organizations. Every organization is different, making it imperative that each identifies its own biggest risks and then quantifies and prioritizes these risks to make the biggest impact regarding protecting its assets. In your journal, write about cybersecurity risk management strategy. Your journal entry should be two … Read more

journal

One of the fundamental tasks of a cybersecurity professional is protecting the organization’s data. There are many things to think about when trying to protect data and plan for potential threats. In your journal, write about how cryptography is important to cybersecurity. Describe the differences between data in motion and data at rest. Be certain … Read more

journal

Cybersecurity professionals do not simply focus on securing and protecting technical systems. They must also protect against humans.  In your journal, write about how humans pose a threat to cybersecurity in organizations. Also, address some strategies or techniques that organizations can incorporate to help defend against the human element of cybersecurity. Your journal entry should … Read more

journal

Contingency planning is an important part of the cybersecurity process. It is necessary to have a plan for mitigating and recovering from damage. In your journal, you will reflect on cryptography and contingency planning. Specifically, you will discuss cryptography, keys, algorithms, business continuity, and disaster recovery. Your journal entry should be three or more sentences … Read more

journal

Ensuring data privacy is an essential skill for cybersecurity professionals. In your journal, you will reflect on data privacy and data protection. Specifically, you will discuss access controls, data privacy, and legislation for compliance. Your journal entry should be three or more sentences per prompt and address the following questions: How are access controls related … Read more

journal

As you learn about data protection and legislation, it is important to reflect on what you have read and learned in this module. In your journal, you will reflect on general data protection. Specifically, you will discuss legislation, threat actors, and data protection compliance. Your journal entry should be three or more sentences per prompt … Read more