Capella University MS NSA Study: Security and Forensics Focus-Reflections


Collaboration Check-In

Your assigned group should be collaborating on your individual proposal ideas, agreeing on how you will share information for the group proposal, confirming that the roles assigned by your instructor make sense, and developing a plan for completing the group activity.

For this Collaboration Check-In, each learner will share what is going well in your group's collaboration and what you would change from a communications process to improve the collaboration.



 11-28-2017



Unit 8 Discussion Post 2 Response

Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



The aim of information security is to ensure business continuity

and to minimize

business damage by preventing and minimizing

the impact of security incidents

(von Solms, 1998). (Drevin, et., al., 2010, p. 316)



I have been out of class, for almost a week. I have been physically ill, and, I am in the middle of court-with no access, to a public defender. I am working alone, on my group assignments. I have had, significant problems in the past, with fellow students, stealing my homework. I am comfortable, working alone. I will be turning in, both-my assignment 7, and my assignment 8, this week. I prefer, to work alone, and will make additional effort, to turn in, another original research paper, discussing information, that is not already being covered, by other students, in the class.



        There are 3 main issues of concern, related to modern computer security, and information management:



(1) Confidentiality. Computer-related assets are accessed by authorised parties only.

(2) Integrity. Correctness of computer assets such as data; data cannot be modified

by unauthorised parties.

(3) Availability. Computer-related assets are accessible to authorised parties at

appropriate times. (Drevin, et., al., 2010, p. 316)



The myriad ways in which, data and information, can be: secured, stored, transferred, shared, etc., is the focus, of the study program. New technologies, are further complicating, the ability of US companies, to gain control, over data, that must necessarily be collected, to further Intl business. Unfortunately, the computer designers, and software creating companies, from America, are not concerned, about the safety, and American information. Newer programs, and information communications systems, are making data-more, and more vulnerable, and much harder, to manage, or to secure.



        I am benefiting, from the class activities, and, from the opportunity, to respond to the other students, through the classroom discussion forum. I am learning, a great deal, through the Capella University Online Library, and database resources. I check-in, to the online library databases-for every single research activity, that is due. I noticed, that other students, are writing enough sometimes, however-they are not supporting statements, with academic resources, and literature, from the Capella Library, or from other online information resources.



      The protection of information assets usually relies on the success of information security plans and the implementation of various security controls as part of such a plan” (Drevin, et., al., 2010, p. 1). The IT field changes quickly. Online reference resources are available. There is no way, to work, and to remain current, with new information, in the IT field, of: security, and forensics-without taking the required time, to: research, read, and think critically, about the newer technologies, such as: IoT, and BOYD, that are a problem, and-the new reality.



          This semester, is almost complete. I believe, that the experiences, thus far, have been beneficial for me. I am independent. I prefer not to rely upon others. I find, that it can be too difficult, working with others, because, some people, try to edit my research papers, and-in fact, change my meanings, by altering, how I have chosen, to express my findings. I am happy, to be enrolled, as a part-time student, at Capella University. You learn, what you chose to, through Capella. Attendance, is not enough.







References



Drevin, Lynette, Kruger, Hennie& Steyn, Tjaart. (2010). A Vocabulary Test to Assess Information Security Awareness. Information Management& Computer Security: Emerald Group Publishing, Ltd. Vol. 18, No. 5. p. 316-327. Retrieved from www.emeraldinsight.com/0968-5227.htm




Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2