Learning Journal Unit 1 Reflection On Cybersecurity Concepts

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Learning Journal Unit 1: Reflection on Cybersecurity Concepts

Department of Science, University of the People

Sabrina Mcnair

February 8, 2024

In this unit, I delved into the fundamental concepts of cybersecurity, exploring topics such as
network security, SSL, and HTTPS protocols, and the C.I.A. triad. Reflecting on my learning
experience, I will address the prompts outlined in the Learning Journal:

1. Most Interesting Topic:


The most intriguing topic for me was the C.I.A. triad. Understanding how confidentiality,
integrity, and availability serve as the pillars of cybersecurity fascinated me. The C.I.A. triad's
role in balancing measures to safeguard information and ensure the smooth functioning of
networks is crucial. This topic stood out due to its foundational importance in designing
robust cybersecurity strategies.

Reasons for Noticing:


The C.I.A. triad caught my attention because it supplies a comprehensive framework for
addressing security concerns. Its relevance in supporting the confidentiality of information,
ensuring data integrity, and guaranteeing availability aligns with the core goals of
cybersecurity.

Impression:
My impression is that the C.I.A. triad forms the backbone of cybersecurity, emphasizing the
need for an integrated approach to protect digital assets. This framework adds a layer of
thoughtfulness to security practices, making it more than just a checklist but a strategic
philosophy.

Plans for Further Exploration:


To deepen my understanding, I plan to explore case studies where organizations successfully
implemented the C.I.A. triad to thwart cyber threats. This will supply practical insights into
how these principles can be effectively applied in real-world scenarios.

2. Importance of Basic Cybersecurity Skills:


Learning basic cybersecurity skills is imperative for anyone using digital devices, networks,
and the internet. Cybersecurity is akin to a digital defense mechanism, and without it, users
expose themselves to various risks.

Cybersecurity Concerns:
 Personal Needs: Individuals are at risk of identity theft, financial fraud, and invasion of
privacy.
 Business Needs: Organizations face threats like data breaches, which can result in
financial losses and damage to reputation.

3. Challenges in Securing Digital Devices:


Securing access to digital devices presents challenges, both physically and virtually.
Personally, I face the following challenges:
 Physical Access: Protecting devices from theft or unauthorized physical access.
 Online Security: Ensuring robust passwords, two-factor authentication, and staying
vigilant against phishing attempts.

Security Practices:
 Physical Security: Using locks, encrypted drives, and avoiding leaving devices
unattended.
 Online Security: Regularly updating passwords, using reputable security software, and
staying informed about emerging threats.

Self-Assessment:
While I implement various security measures, continuous improvement is essential. Cyber
threats evolve, and staying ahead requires ongoing education and adaptation. Therefore, I
acknowledge the need to continually enhance my practices.

Connection to Course Readings and Literature:


In exploring the C.I.A. triad, I drew upon various resources, including articles and videos. For
instance, the TechTarget article on "Confidentiality, Integrity, and Availability (CIA triad)"
supplied a concise overview, enhancing my understanding. Additionally, the video resources
on network security and SSL protocols offered practical insights, connecting theoretical
concepts to real-world applications. (Chai, W. 2021)
In conclusion, this unit has laid a solid foundation for understanding cybersecurity essentials.
The C.I.A. triad has sparked my interest, and I am eager to explore its practical applications
in later units.

References:
Chai, W. (2021, January). Confidentiality, integrity, and availability (CIA triad). TechTarget.
https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA

You might also like