Capella University MS NSA Study: Security and Forensics Focus-Reflections
Collaboration Check-In
Your assigned group
should be collaborating on your individual proposal ideas, agreeing on how you
will share information for the group proposal, confirming that the roles
assigned by your instructor make sense, and developing a plan for completing
the group activity.
For this Collaboration
Check-In, each learner will share what is going well in your group's
collaboration and what you would change from a communications process to
improve the collaboration.
11-28-2017
Unit 8 Discussion Post
2 Response
Response from: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
The
aim of information security is to ensure business continuity
and to
minimize
business
damage by preventing and minimizing
the
impact of security incidents
(von Solms, 1998). (Drevin, et., al., 2010, p. 316)
I have been out of
class, for almost a week. I have been physically ill, and, I am in the middle
of court-with no access, to a public defender. I am working alone, on my group
assignments. I have had, significant problems in the past, with fellow
students, stealing my homework. I am comfortable, working alone. I will be
turning in, both-my assignment 7, and my assignment 8, this week. I prefer, to
work alone, and will make additional effort, to turn in, another original
research paper, discussing information, that is not already being covered, by
other students, in the class.
There are 3 main issues of concern,
related to modern computer security, and information management:
(1)
Confidentiality. Computer-related assets are accessed by authorised parties
only.
(2)
Integrity. Correctness of computer assets such as data; data cannot be modified
by
unauthorised parties.
(3)
Availability. Computer-related assets are accessible to authorised parties at
appropriate times. (Drevin, et.,
al., 2010, p. 316)
The myriad ways in which,
data and information, can be: secured, stored, transferred, shared, etc., is
the focus, of the study program. New technologies, are further complicating,
the ability of US companies, to gain control, over data, that must necessarily
be collected, to further Intl business. Unfortunately, the computer designers,
and software creating companies, from America, are not concerned, about the safety,
and American information. Newer programs, and information communications
systems, are making data-more, and more vulnerable, and much harder, to manage,
or to secure.
I am benefiting, from the class
activities, and, from the opportunity, to respond to the other students,
through the classroom discussion forum. I am learning, a great deal, through
the Capella University Online Library, and database resources. I check-in, to
the online library databases-for every single research activity, that is due. I
noticed, that other students, are writing enough sometimes, however-they are
not supporting statements, with academic resources, and literature, from the
Capella Library, or from other online information resources.
“The protection of information assets
usually relies on the success of information security plans and the implementation of various
security controls as part of such a plan” (Drevin, et., al., 2010, p. 1). The
IT field changes quickly. Online reference resources are available. There is no
way, to work, and to remain current, with new information, in the IT field, of:
security, and forensics-without taking the required time, to: research, read,
and think critically, about the newer technologies, such as: IoT, and BOYD,
that are a problem, and-the new reality.
This semester, is almost complete. I
believe, that the experiences, thus far, have been beneficial for me. I am
independent. I prefer not to rely upon others. I find, that it can be too
difficult, working with others, because, some people, try to edit my research papers,
and-in fact, change my meanings, by altering, how I have chosen, to express my
findings. I am happy, to be enrolled, as a part-time student, at Capella
University. You learn, what you chose to, through Capella. Attendance, is not
enough.
References
Drevin, Lynette, Kruger,
Hennie& Steyn, Tjaart. (2010). A Vocabulary Test to Assess Information
Security Awareness. Information Management& Computer Security: Emerald
Group Publishing, Ltd. Vol. 18, No. 5. p. 316-327. Retrieved from www.emeraldinsight.com/0968-5227.htm
Comments
Post a Comment