Digital Forensics & Everything infosec.
Welcome to my cybersecurity blog site, if you have visited before then welcome back! I know some of you may have read my last blog post about the credibility of blogs. Well if you didn’t, you missed out on some useful information regarding the credibility of blogs so definitely check it out. Similarly, this week I will be going over the credibility of trade publications and how they can be of value for researchers. I will be going over the details on two scholarly trade publications regarding cybersecurity from ProQuest Career and Technical Education Database. I specifically chose this database for my two examples since it has countless cybersecurity related trade publications that are credible with valuable content. As I mentioned on previously on my last blog, it is crucial in finding the best sources online to become knowledgeable and not waste your time on the internet. First, what is a database? A database is a wide-ranging collection of academic works, generally consisting of scholarly journals and articles. Several databases can generally be found in your university or high school library website. The Database resource I will be using is ProQuest, which is home to databases across several fields. Thousands of trade publications or journals can be found on databases. Trade journals or trade magazines are professional publications written for specific audiences that either work for a specific trade, and for people who have interest in that industry. Trade journals are not only informative, but are generally more engaging to read vs. other sources because they may come in a newspaper or magazine format. The first trade journal I will be going over is titled: AI Enters the Cyber Attack Realm. This trade journal is copyrighted and published by Armed Forces Communications and Electronics Association. The AFCEA for short, is a professional association that connects people, ideas and solutions for global security as mentioned in their website. The journal has one author, by the name of Jonathan Hobbs. The title pretty much sums up the purpose of this publication. Many of you know how Artificial Intelligence is taking over the technology world we live in today and has been helping so many industries in becoming efficient. Although AI has several benefits, the journal explains the dark side of AI and how important cybersecurity plays an important role behind AI’s potential negative effects. Today, some AI machines are more efficient than cyber criminals and have the capability of hacking into secure systems. If you want to read and learn more, I would recommend this journal for anyone interested in learning more about AI in a cybersecurity sense. The journal is of high value for researches as it on a database. It is important to note that most sources found on academic databases are the most credible because they most likely have been written by scholars or experts in that field. https://www.afcea.org/site The next trade publication or journal I will be going over is titled: Cybersecurity and the Industrial IoT, which is also from ProQuest Career and Technical Education Database. This trade journal was published by Informa and copyrighted from Penton Media Inc. This journal was written by Doug Chandler, who has over a thousand journals on ProQuest, all published by Informa. Informa is a leading business intelligence and academic publisher who operate in the knowledge and information economy. This journal in specific discusses the impact cybersecurity has on industrial control systems also known as ICS. A decade ago, I am sure most people would not have predicted that cyber crime would take place in the industrial market. Today, attacks and discoveries of vulnerabilities has become a major concern in some industries. ICS’s have developed substantially and now have embedded intelligence that retains confidential information about machine performance as mentioned in the abstract of this journal. Electrical distributors out of all face the most attacks and it has become a critical problem for the industry. If you are interested in learning about the advancement of technology in different industries and how cybersecurity plays a role, this trade journal is an excellent choice. As I mentioned earlier, Informa has over a thousand publications on technology related news and is a great resource for researchers.
Today, I went over two trade publications from ProQuest. These two sources serve as two scholarly and credible sources regarding cybersecurity news. Both sources were also published in 2018 so they are very relevant and appropriate if you are looking for current research. A quick recap and tip about scholarly sources and databases are that not all articles or journals could be considered as scholarly sources. Journals become scholarly through being published through scholars, and journal articles become scholarly through being written by a scholar. You can confirm that a journal or article is scholarly if it is found on an academic database site, because only scholarly sources are added to a database. Again, don’t forget to come back next week and check out my next cybersecurity related blog post. https://informa.com/
0 Comments
Have you ever thought about the credibility of blogs and websites you browse online? As you are reading through my blog posts, you may or may not have considered where I am getting my information from, how accurately I am portraying it and whether it is useful information. This week I will be going over two reputable information security websites, and by the end of my blog you will get an understanding on why they are both reputable sources. It is crucial in finding the best sources online to become knowledgeable and not waste your time on the internet. The first website I will be going over is www.itsecurityguru.org. IT Security Guru is a daily news digest consisting of all the latest Information Security news and trends. The main editor and blogger of this website is Dean Alvarez, who has his own section called editor news. The hierarchy of the website from top to bottom includes breaking news, top stories, editor’s news, latest Infosec videos, analysis, and lastly case studies. As you can tell, IT Security Guru offers a wide variety of information on its website, but how can we tell if its credible? First, this website offers the latest Infosec news and it backs it up by frequently posting up-to-date content. The most recent news article was from less than a week ago, and this shows that the news on this website is recent and up-to-date. The website is affiliated with vpnMentor, a website that has expert reviews on VPNs, which are Virtual Private Networks. vpnMentor also ranked IT Security Guru as a top 15 Security Blogger in the world. The intended audience for this website is anyone with an interest in information security and wants to be in the loop with the most recent news. The website also has a section for job listings from reputable organizations, and these listings have all sorts of positions required in the cybersecurity field. IT Security Guru is a perfect website to visit if you want a quick read on the latest information security related news and analysis. www.itsecurityguru.orgThe second website is www.infosecurity-magazine.com. Infosecurity Magazine is a website that has been offering news articles, free webinars, whitepapers and virtual conferences. Infosecurity Magazine gets its name from being a popular magazine before the online edition was launched. The magazine has been around for the past decade and is still offered through a subscription. But why get the magazine when you can get all the content plus online services from the website! Infosecurity is a platform part of the Infosecurity Group that ranges from parts across the world. There is an Infosecurity Europe, North America, Belgium, Denmark, Netherlands, Russia, Mexico and Middle East. Every year there is an event called Infosecurity Europe. Infosecurity is the largest and most wide-ranging conference program that includes over 400 exhibitors showcasing their recent information security products and solutions. The event has roughly 20,000 information security professionals who attend every year. I would say just from the worldwide significance and the fact it has been a published magazine over a decade, makes the affiliated website a compelling and credible source which is worth your time to visit. The main goal for Infosecurity magazine is to provide year-round, award-winning editorial content and in-depth analysis from industry experts. This sort of information is intended for everyone interested to be a part of the cybersecurity realm, so please make a visit to Infosecurity magazine is you want to enrich your knowledge and stay up-to-date. There is an endless amount of information out there on the world wide web. In conclusion, you must be wary in the sources you access online, and in this case, we are talking specifically about blogs. Finding credible sources for blogs will help you gain the most up to date knowledge in your field and you can trust everything you are reading about. The two websites I went over in this post are two credible and highly informative cybersecurity blogs and serve as excellent examples if you are looking for blogs in another field. Don’t forget to come back next week and check out the next blog post, especially if you are pursuing a field in cybersecurity. www.infosecurity-magazine.comCybersecurity is a very wide-ranging field, meaning that there are many different areas and career pathways you can pursue. With the wide range of areas comes a wide range of professionals who are experts in their field of work. Although the field of cybersecurity is relatively new, it is a widely growing field and there are numerous cybersecurity professionals and scholars all over the world who possess a lifetime of experience. In this blog, I will be discussing two eminent experts in cybersecurity from the D.C. Metro region. The first scholar I will discuss is, Dr. Margaret Leary, who is currently a information security and cybersecurity professor at George Mason University and Northern Virginia Community College. Dr. Leary has been working professionally for more than 25 years in the cybersecurity and Information Technology sector. Dr. Leary received her Ph.D. in Organization and Management/IT Specialization from Capella University, her M.B.A in Technology Management Specialization from the University of Phoenix, and her B.S. n Business from University of Phoenix. Dr. Leary serves a Co-Principle Investigator and Senior Advisor for National CyberWatch, which is a consortium of higher education institution focused on Information Security education and the national cybersecurity workforce. She has spent over 13 years being in different senior level cybersecurity positions in the D.C. metro area. Dr. Leary hold several cybersecurity certifications including CISSP, CIPP/G, CRISC, and CEH. Dr. Leary has also contributed to several papers on cybersecurity issues, specifically in identity authentication, and cloud security. Dr. Leary is currently a Senior Security Advisor with Camber Corporation, and her job is to provide security consultation and risk assessment services. Dr. Leary also currently teaches two information security courses at George Mason. She teaches IT-223, and IT-462 which both are Cyber security principles classes, one being the prerequisite to the other. Dr. Leary has been a professor, principle investigator, senior advisor, and a member of the NCC Leadership Team for the past 10 years, and through all these platforms and experience of leadership, she has influenced and spread her knowledge to over 500 students and other professionals in the cybersecurity field. Dr. Margaret Leary Just like Dr. Margaret Leary, Dr. Thomas Winston is also a cybersecurity scholar and professor at George Mason University. Dr. Winston is an Assistant Professor in the Information Technology Department at Mason, and the head director of the Information Security concentration for IT majors. Dr. Leary is also a member of the Learning Agents Center at George Mason University. Dr. Winston received his PhD. in Information Systems and Nova Southeastern University. He also has an M.S. in Law, Policy, and Society at Northeastern University. In addition, he has a M.S. in Telecommunications from Boston University, and M.S. in Education, and B.A in Linguistics/Russian from the State University of NY at Albany. Based on his education, anyone can assume Dr. Winston is probably one of the most well-rounded professionals having degrees across diverse fields of study. Dr. Winston spent most of his career overseas, on analysis of cyber threat for Central Eurasia, South Asia, and the Middle East. He was the an Officer at the Department of State, and a forensic cyber crime investigator and analyst. Dr. Winston has contributed to several publications on international relations, law, and critical infrastructure protection. Pertaining specifically to cybersecurity, he has published papers on foreign cyber threats and cyber intelligence. Dr. Winston also spent a lot of time in research for critical infrastructure protection, social network analysis, information policy, and telemedicine. Recently, Dr. Winston published a précis of his dissertation at the 49th HICSS conference. Just like Dr. Leary, Dr. Winston also teaches IT-223, and IT-462, two Cyber security principles classes at George Mason University for the Information Security concentration. Outside being a head director and professor for Information Security as Mason, Dr. Winston has a background in telecommunications, information systems security, and international relations, and through all fields of study and teaching experience, he has influenced a massive number of students who are pursuing an IT or cybersecurity degree. Dr. Thomas Winston Now that you’ve got some insight on how much knowledge and experience a few cybersecurity experts have, you should do some quick research on who the cybersecurity professionals are in your area. Speaking to a cybersecurity expert will not only give you advice on the subject but will also give the best career advice on how to become a cybersecurity professional yourself one day. If you live in the Northern Virginia area, you must contact both Dr. Margret Leary and Dr. Thomas Winston if you wish to learn more about the program at George Mason university, or to gain some career insight regarding the cybersecurity field. Works Cited: https://www.nationalcyberwatch.org/about/staff-bio/dr-margaret-leary/ https://ist.gmu.edu/people/detail/thomas-winston/ My name is Prince and I’m currently a Senior at George Mason University. I’m finishing up my undergrad in Information Technology with a concentration in Information security. I’m writing about two very important and beneficial professional associations and its aimed for both beginners looking to get into the Cybersecurity field and for IT professionals looking to take their careers to the next level. (ISC)2 (International Info System Security Consortium) https://www.isc2.org/ (ISC)2 is the International Info System Security Consortium. (ISC)2 is a nonprofit membership association that offers globally recognized certifications, networking opportunities, and professional development and leadership tools. If you are interested in learning more about certifications, check out the Resource Center. The (ISC)2 Resource center provides eBooks, videos, guides, and all types study aids that will help to decide which certification you want to pursue. Once you make a free account, you will be able to register for training and stay up-to-date with (ISC)2. Throughout the year the ISC also offers a wide variety of events and webinars you can attend for free. Once you make an account with (ISC)2, you can explore all the benefits of an (ISC) 2 membership. The requirements for membership are getting a (ISC)2 certification and paying a small annual fee. A membership usually costs around $35 and depends on which certification you possess. Becoming a member of the (ISC)2 comes with some major perks. Benefits include free subscription to the InfoSecurity Professional Magazine, 50% off official (ISC)2 textbooks, deep discounts on industry conferences, professional recognition through (ISC)2 Awards programs, and volunteering opportunities such as The Center for Cyber Safety and Education’s Safe and Secure Online Program. The (ISC)2 is a great place for IT professionals that are looking to build on to their cybersecurity career. Even if you are not a professional, it offers numerous amounts of resources, guides and webinars which will help give you up-to-date cybersecurity knowledge and help you decide where in the field you want to get into. If you are already a cybersecurity student at Mason and would like a free membership and resume builder, check out the next professional association I will talking about below! ISSA (Information Systems Security Association) https://www.issa.org/ ISSA is the Information Systems Security Association. ISSA is also a nonprofit international organization, and it offers peer networking, education and training, industry tools and resources, and its core purpose is to promote a secure digital world while developing the professional growth of its members.
ISSA hosts several activities and its primarily how the collaboration and transfer of information takes place. Some of the major activities are international conferences, local chapter meetings, seminars, training sessions, and networking workshops. There are also volunteering opportunities by joining committees, and this is a great opportunity to get leadership experience in the security industry. If you do have time to attend these activities you can still benefit from ISSA through web conferences and reading the E-Newsletters. If you are currently a cybersecurity or information security student at George Mason, you can get free membership at ISSA for one full year. Your teacher will provide you a promo code that you can use when registering for membership. I know this because I am part of the Northern Virginia Chapter at ISSA. I joined almost a year back, and even though I didn’t attend the activities, I always read the E-Newsletters and stayed up-to-date with the information through the ISSA website which I found to be very informative and beneficial. If you are not a cybersecurity student and would like to become a member of ISSA, it is $95 a year plus chapter dues. Its an investment for your future and the benefits are priceless. ISSA is generally a professional association for students, but the benefits will always be there after you graduate. If you are looking for a resume builder and the best networking opportunity for the field of cybersecurity, become a member of ISSA today. I hope this blog helped you and served as a helpful resource in learning about professional associations related to your field of study. I would recommend ISSA if you are new to the cybersecurity field, but both professional associations are a great resource and place to start. I will be posting weekly blogs regarding cybersecurity so don’t forgot to check back in a week for the next one! |
AuthorPrince Patrick Jackson Clement was born on April 20th, 1997 in Madurai, Tamil Nadu. Prince is currently attending George Mason University and is doing his Masters in Digital Forensics and Cyber Analysis. Prince is currently working as an IT Support Analyst at MyEyeDr. His career aspiration after graduating college is working at Amazon as a Cloud Solutions Architect. Archives |