Insights on Volunteer Leadership and Cybersecurity: Peer Responses from Week 8

Peer Responses Week 8

LDR 201 (MLA FORMAT)

Sabrina: For my volunteer hours, I decided to assist the recreational department. My duties were to help coach soccer and basketball. I chose this method because I truly enjoy working with kids, no matter the situation. Choosing this was not hard at all, I already knew exactly what I wanted to do. It was truly a fun experience. Doing this has helped me develop better communication skills, empathy and support as well as leading by example. I gained being a leader comes with many hats. You will have people looking up to you, so it is always important to always lead by example.

Yes, I do feel that I can be both at the same time. I will draw the line if I notice that the boundaries that I have set is going unnoticed, and if I realize that there has been no focus on development. My most important takeaway from this class is being honest and being empathetic like everyone deserves. Though it was many other things, I loved the most about being a leader.

Ti: For my volunteer work, I went back to my high school band program to get my community hours. Volunteering at my old high school marching band allowed me to give back to the community that had shaped me and enabled early leadership teaching. While I provide guidance and support to current band members based on my experiences as a former member while also using my passion and love for music, I can contribute my musical and organizational skills to help enhance the band’s performances and events.Being both a servant and a leader at the same time is definitely possible. A servant leader focuses on the growth and well-being of the people they lead, while also providing direction, support, and guidance. It’s important to set boundaries and recognize when you might be giving too much of yourself to your followers, as it’s crucial to maintain your own well-being in order to effectively lead others. My most important takeaway from this class is the concept of servant leadership and the importance of balancing serving others with leading effectively. Recognizing the needs of those I lead and working to support their growth and development while also maintaining a strong sense of direction and purpose is a key aspect of effective leadership.

HSE 410 (APA FORMAT)

Tomesha: Servers, files, computers, and documents are some of the digital evidence used in cybercrime investigations. Any evidence that is submitted for investigations has to be retrieved in the correct manner. If the investigator is searching for a file, they must only retrieve the file. If they are searching for emails or information from a computer, they must retrieve the information from that computer. Any other evidence will not be usable in court.

Encryption is what’s used to protect information. Encryption scrambles information using cryptographic keys. And the only people who can read the codes are the ones with the key information. Ransomware as well as AI are rising with trends in emerging cyber-attacks. Mainly because they are the most used today.

Citation

Taylor, R. W., Fritsch, E. J., Saylor, M. R., & Tafoya, W. L. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Pearson Education (US). https://bookshelf.vitalsource.com/books/9780134846583

Kaitlin: Risk analysis involves many steps that include tedious details. The risk analysis is conducted by the Fortune 500 companies and involves all details of a business. There is not a particular way of conducting a risk analysis. Cyber criminals look for the businesses or platforms that are weak and have little to no security, that is the first step of the risk assessment, is to assess all systems within a business or organization. The organization should have a plan that is examined on improving technology, an IT plan, and expanding the security. One of the types of digital evidence used in cybercrime investigation is hashing. Hashing is the collect of data (quantities) that are extracted from technology into a data set. There are no two same hashing values, like fingerprints. The best evidence is the unaltered evidence to be used in court as a copy. Some of the more known tools to analyze evidence is EnCase, SafeBack, Md5sum, Grep, EventLog Analyzer, Ethereal, Whois and Registry Recon, and XRY. Encryptions maek it more difficult for cybercriminals to gain access to data that is being stored. Nowadays, there is normally a two-factor authentication sign-in for all technology platforms. By having two-factor authentication, it makes it protects information from cybercriminals. Encryptions increase the data authenticity, integrity, and confidentiality. The future trends regarding cyber-threats will drastically increase. The police and courts will be impacted. Fraud and identity theft will be the largest computer crime. The threats of hackers will continue to increase, terrorists will continue to use global networking. Overall there will continue to be an increase in cyber crimes and methods of attacking will continue to advance.

Reference

Taylor, R. W., Fritsch, E. J., Saylor, M. R., & Tafoya, W. L. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Pearson Education (US). https://bookshelf.vitalsource.com/books/9780134846583

HSE 490 (APA FORMAT)

Spencer: Insider threats are a big problem that companies don’t think about enough. People inside the company who are allowed to access systems, networks, and private data are the ones making these claims. Because they are known, they can get around many security measures, which is a threat because they could do a lot of damage by stealing data, sabotaging systems, or doing things they didn’t mean to. Insider threats are especially dangerous because the person posing the threat usually knows a lot about the company’s weak spots, procedures, and valuable assets. Their acts can cost them money, hurt their image, stop operations, and put intellectual property at risk. Insider threats have a lot of different and complicated reasons for happening. A common reason is to make money. Some insiders sell private information or use their knowledge to make money for themselves. Employees who feel mistreated or ignored may do bad things to hurt the company out of anger or desire for payback. They might share information they think should be public because of their beliefs. Some insiders may be forced or manipulated by people outside the company. Insider risks aren’t always evil; sometimes they happen because someone is careless, doesn’t know the rules for security, or makes a mistake. There are also a lot of different things that affect the information, skills, and resources of insider risks. How much they know about and can reach the organization’s tools is directly related to how much damage they could do. The level of difficulty of their activities depends on how simple or advanced their technical skills are. Insiders who work in IT or cybersecurity are especially dangerous because they have a lot of access and know a lot about technology. Insiders often have direct access to secret systems, databases, and physical places. The tools they can use depend on their position. They can work quietly and maybe even trick other people because they know the organization’s mindset and how people talk to each other. Also, workers who have been there for a long time may know things about old systems or security holes that aren’t widely known in the current security framework. Organizations need to understand these factors in order to come up with complete plans to find, stop, and deal with insider threats.

References

Radvanovsky, R. S., & McDougall, A. (2018). Critical Infrastructure (4th ed.). Taylor & Francis. https://bookshelf.vitalsource.com/books/9781351674898

Defining Insider Threats | CISA. (n.d.). Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats#:~:text=Insider%20threats

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code GREAT