100% (1)
page:
2 pages/≈550 words
Sources:
0
Style:
APA
Subject:
Management
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.37
Topic:

Cyber security reflection memo

Coursework Instructions:
Follow the requirement and rubric I uploaded to complete the reflection memo. You may use the material I uploaded. The material I uploaded includes class activities, course slides and assignments. Feel free to contact me if you have any questions.
Coursework Sample Content Preview:
Reflection on Cyber-Security Management Student Name University Course Professor Name Date Reflection on Cyber-Security Management The Cyber-Security Management course helped me evaluate my understanding of cyber-security and its implications on personal, institutional, and societal levels. I learned several essential principles, including confidentiality and integrity, which ensure that only authorized users can access accurate and safe data. Thakur (2024) asserts that cyber threats are becoming increasingly sophisticated, highlighting the necessity of defense mechanisms. The course parts I found theoretically stimulating include cryptography, breaking into the cyber-security space, and the NIST cyber-security framework. Cryptography The course helped me understand that cryptography is the foundation of protected communication, enabling information confidentiality and integrity. Organizations use cryptography to ensure that only authorized users can access sensitive data. For instance, cryptography helps authorities to encrypt emails, and financial institutions protect their monetary activities against eavesdropping. Although this technology safeguards sensitive information, malicious people use it to obfuscate data (Mohammad, 2022). This challenge emphasizes the essence of having decryption tactics in place. I learned that our computers need post-quantum encryption algorithms to stave off cyber-attacks. I plan to explore these methods to assess whether they are more secure to endure current and future attacks from conventional and quantum computers, respectively. Breaking into the Cyber-Security Space This part that Weinberger (2024) pres...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!