Analyzing and Summarizing this CIS 608 - Information Security Management Blog
Assignment 12.4 (Post to your Blog and to the Week 12 Forum)
This assignment is worth 50 points.
Time to finish up your blog. This last assignment should be a retrospective look at your postings over the last 11 weeks. Time for a little analysis. Write up an entry that provides a summary of what you chose to write about.
First, you need to categorize your topics of choice. Did you write primarily on operating system issues? User errors? Viruses? Or did you write about a variety of topics? Why did you choose those topics?
Next, you need to include an analysis of where you got your material. Did you use the same source each week? A variety each week?
As the last part of this entry, include whether or not you thought this type of blog might be useful to an information security professional and provide a few lessons learned for the next group of students.
To get credit for this assignment, the URL must be posted in this assignment.
============================== Answers ============================
Part 1 - First, you need to categorize your topics of choice. Did you write primarily on operating system issues? User errors? Viruses? Or did you write about a variety of topics? Why did you choose those topics?
(See chart above)
Summary Topic with Count
CIS 608 - Week Assignment - Blog = 2
CIS 608 - Week Assignments = 13
Cloud Computing, Security and Certifications = 1
Current Event in Information Security - Computer Crime = 9
Current Events in Information Security - International Cyberwar Threats = 10
Cybersecurity Policies = 1
Discussion about Secret Message Communications from World War II = 1
Domain Names related to Information Security = 1
Electronic Health Records - The Need for Security and Privacy = 1
Framework for Information Security Management = 1
Freedom of Information Act (FOIA) Resources and Information Security = 1
How the USA PATRIOT ACT Affects The Bill of Rights 1 Incident Response Plans = 2 Information Asset Classification = 1
Information Security and Information Security Tools = 1
Information Security Awareness Training = 3
Internet History and Growth = 1
IT Professional Certifications, Value and Relevance = 3
Leadership as a Component of Information Security = 2
News about an Information Security Blog = 1
Resources for Information Security Topics = 5
Return on Security Investment (RoSI) = 3
Security Architecture and Design - CYBR 515 Assignment = 3
----------------------------------------------------------------------
Part 2 - Next, you need to include an analysis of where you got your material. Did you use the same source each week? A variety each week?
No. Different sources each week.
Yes - a variety of sources. See summary below and above.
CIS 608 Assignment = 6
CIS 608 Material = 12
Course Text = 1
Current Event = 1
CYBR 515 Assignment = 1
CIS 608 Material = 3
Electronic Text Reference = 7
Industry Reference on Web = 1
Information Security Blog = 1
Information Website = 4
Self = 4
Various Texts = 1
Various Web URLS = 8
Web Article = 14
Website for Tool = 2
White Paper = 2
----------------------------------------------------------------------
Part 3 - As the last part of this entry, include whether or not you thought this type of blog might be useful to an information security professional and provide a few lessons learned for the next group of students.
As a certified Information Security who is also a graduate student, I found this blog exercise very useful because it forced me to regularly look for Information Security topics to analyze and blog about as part of this course requirement. I completed and analyzed 66 blog entries and learned a lot while doing it. It will remain here on the web as a snapshot of the Information Security landscape here at the end of 2011.
Besides the amazing things I learned and wrote about, I learned that I probably blogged too much. It took me about 10 to 12 hours to do this last assignment where I had to analyze and summarize my blog. With my busy schedule, that is just too much time.
Parting comments: I hope we will all be getting smarter about how we do things in cyberspace, because the consequences of slipping up and letting our guard down become more severe each day as more and more of our lives are enveloped by the world of the web and cyberspace.
================================
Bill
William Favre Slater, III, PMP
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
Group 2
CIS 608 Blog: http://cis608.blogspot.com
http://billslater.com/career
Chicago, IL