Peer Responses Week 8
LDR 201 (MLA FORMAT)
Sabrina: For my volunteer hours, I decided to assist the recreational department. My duties were to help coach soccer and basketball. I chose this method because I truly enjoy working with kids, no matter the situation. Choosing this was not hard at all, I already knew exactly what I wanted to do. It was truly a fun experience. Doing this has helped me develop better communication skills, empathy and support as well as leading by example. I gained being a leader comes with many hats. You will have people looking up to you, so it is always important to always lead by example.
Yes, I do feel that I can be both at the same time. I will draw the line if I notice that the boundaries that I have set is going unnoticed, and if I realize that there has been no focus on development. My most important takeaway from this class is being honest and being empathetic like everyone deserves. Though it was many other things, I loved the most about being a leader.
Ti: For my volunteer work, I went back to my high school band program to get my community hours. Volunteering at my old high school marching band allowed me to give back to the community that had shaped me and enabled early leadership teaching. While I provide guidance and support to current band members based on my experiences as a former member while also using my passion and love for music, I can contribute my musical and organizational skills to help enhance the band’s performances and events.Being both a servant and a leader at the same time is definitely possible. A servant leader focuses on the growth and well-being of the people they lead, while also providing direction, support, and guidance. It’s important to set boundaries and recognize when you might be giving too much of yourself to your followers, as it’s crucial to maintain your own well-being in order to effectively lead others. My most important takeaway from this class is the concept of servant leadership and the importance of balancing serving others with leading effectively. Recognizing the needs of those I lead and working to support their growth and development while also maintaining a strong sense of direction and purpose is a key aspect of effective leadership.
HSE 410 (APA FORMAT)
Tomesha: Servers, files, computers, and documents are some of the digital evidence used in cybercrime investigations. Any evidence that is submitted for investigations has to be retrieved in the correct manner. If the investigator is searching for a file, they must only retrieve the file. If they are searching for emails or information from a computer, they must retrieve the information from that computer. Any other evidence will not be usable in court.
Encryption is what’s used to protect information. Encryption scrambles information using cryptographic keys. And the only people who can read the codes are the ones with the key information. Ransomware as well as AI are rising with trends in emerging cyber-attacks. Mainly because they are the most used today.
Citation
Taylor, R. W., Fritsch, E. J., Saylor, M. R., & Tafoya, W. L. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Pearson Education (US). https://bookshelf.vitalsource.com/books/9780134846583
Kaitlin: Risk analysis involves many steps that include tedious details. The risk analysis is conducted by the Fortune 500 companies and involves all details of a business. There is not a particular way of conducting a risk analysis. Cyber criminals look for the businesses or platforms that are weak and have little to no security, that is the first step of the risk assessment, is to assess all systems within a business or organization. The organization should have a plan that is examined on improving technology, an IT plan, and expanding the security. One of the types of digital evidence used in cybercrime investigation is hashing. Hashing is the collect of data (quantities) that are extracted from technology into a data set. There are no two same hashing values, like fingerprints. The best evidence is the unaltered evidence to be used in court as a copy. Some of the more known tools to analyze evidence is EnCase, SafeBack, Md5sum, Grep, EventLog Analyzer, Ethereal, Whois and Registry Recon, and XRY. Encryptions maek it more difficult for cybercriminals to gain access to data that is being stored. Nowadays, there is normally a two-factor authentication sign-in for all technology platforms. By having two-factor authentication, it makes it protects information from cybercriminals. Encryptions increase the data authenticity, integrity, and confidentiality. The future trends regarding cyber-threats will drastically increase. The police and courts will be impacted. Fraud and identity theft will be the largest computer crime. The threats of hackers will continue to increase, terrorists will continue to use global networking. Overall there will continue to be an increase in cyber crimes and methods of attacking will continue to advance.
Reference
Taylor, R. W., Fritsch, E. J., Saylor, M. R., & Tafoya, W. L. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Pearson Education (US). https://bookshelf.vitalsource.com/books/9780134846583
HSE 490 (APA FORMAT)
Spencer: Insider threats are a big problem that companies don’t think about enough. People inside the company who are allowed to access systems, networks, and private data are the ones making these claims. Because they are known, they can get around many security measures, which is a threat because they could do a lot of damage by stealing data, sabotaging systems, or doing things they didn’t mean to. Insider threats are especially dangerous because the person posing the threat usually knows a lot about the company’s weak spots, procedures, and valuable assets. Their acts can cost them money, hurt their image, stop operations, and put intellectual property at risk. Insider threats have a lot of different and complicated reasons for happening. A common reason is to make money. Some insiders sell private information or use their knowledge to make money for themselves. Employees who feel mistreated or ignored may do bad things to hurt the company out of anger or desire for payback. They might share information they think should be public because of their beliefs. Some insiders may be forced or manipulated by people outside the company. Insider risks aren’t always evil; sometimes they happen because someone is careless, doesn’t know the rules for security, or makes a mistake. There are also a lot of different things that affect the information, skills, and resources of insider risks. How much they know about and can reach the organization’s tools is directly related to how much damage they could do. The level of difficulty of their activities depends on how simple or advanced their technical skills are. Insiders who work in IT or cybersecurity are especially dangerous because they have a lot of access and know a lot about technology. Insiders often have direct access to secret systems, databases, and physical places. The tools they can use depend on their position. They can work quietly and maybe even trick other people because they know the organization’s mindset and how people talk to each other. Also, workers who have been there for a long time may know things about old systems or security holes that aren’t widely known in the current security framework. Organizations need to understand these factors in order to come up with complete plans to find, stop, and deal with insider threats.
References
Radvanovsky, R. S., & McDougall, A. (2018). Critical Infrastructure (4th ed.). Taylor & Francis. https://bookshelf.vitalsource.com/books/9781351674898
Defining Insider Threats | CISA. (n.d.). Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats#:~:text=Insider%20threats
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Academiarank is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download