PROFESSIONAL ACADEMIC STUDY RESOURCES WEBSITE +1 813 434 1028 proexpertwritings@hotmail.com
RESPOND TO BOTH OF THE PEER POSTS
Description
Prompt: Finally, responding to your peers’ posts, discuss how the concepts mentioned by your peers impacted your learning experience during the course.
PEER POST # 1
I’ve learned a tremendous amount about encryption over the past few weeks. The first two weeks were particularly engaging as we delved into the fascinating world of decrypting messages. The challenge of cracking codes and unraveling hidden meanings was incredibly rewarding.
Furthermore, the experience of creating an entire information assurance plan was invaluable. It provided a practical framework for understanding and implementing security measures.
I believe the concepts of risk assessment and vulnerability management will be particularly valuable in my profession as a support generalist in web hosting. These concepts will help me proactively identify and address potential threats to our systems and data, such as DDoS attacks, malware infections, and unauthorized access. By understanding the risks and vulnerabilities faced by our clients, I can provide more effective support and guidance on security best practices.
PEER POST # 2
Over the past ten weeks, I have gained valuable insights into information assurance and security protocols. Two topics that stood out to me the most are email security considerations and the CIA triad (Confidentiality, Integrity, Availability).
As someone aspiring to build a career in cybersecurity, email security is an important area of focus. In roles such as SOC Analyst or Information Systems Security Specialist, I will be responsible for detecting and mitigating phishing attempts, securing organizational communications, and educating users on best practices. Understanding email protocols like SPF, DKIM, and DMARC will enable me to strengthen organizational defenses against email-based attacks and ensure safer communication practices.
The concept of integrity particularly resonated with me due to its role in cybersecurity operations. Maintaining the accuracy and trustworthiness of data is essential for organizations that rely on information to make informed decisions. A compromise in data integrity can lead to financial losses, reputational damage, or even failures within important systems.
This course has provided me with a strong foundation for understanding and applying security principles in real-world scenarios. Developing an information assurance plan has prepared me to effectively plan, implement, and manage security protocols in professional settings. The knowledge I have gained on email security and the CIA triad will serve as key tools as I advance in my cybersecurity career, empowering me to protect systems, networks, and data with confidence.