Academic CIP Papers

As a student pursuing a Bachelor of Science in Cybersecurity, I am immersed in the dynamic and ever-evolving field of cybersecurity. This program is meticulously designed to equip me with the skills and knowledge necessary to become a professional and contributing member of the cybersecurity community. It opens doors to diverse opportunities in corporations, government agencies, public organizations, private companies, and consulting firms. Throughout my studies, I have the chance to delve into various areas of cybersecurity, including cyber defense, cybercrime, cyber operations, cyber law, and cyber intelligence.

Degree Program Objectives

The program aims to achieve several learning outcomes, which are crucial for my development as a cybersecurity professional:

  • Comparing and contrasting various aspects of cybersecurity: I learn about the intricate relationships between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and cyber law within the framework of federal and state laws.
  • Understanding cyber forensics investigations: I gain insights into the processes and goals of cyber forensics investigations, emphasizing the importance of search warrants and chain of custody in investigating computer-related crimes.
  • Developing security architecture strategies: I am trained to create strategies and plans for security architecture, utilizing tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.
  • Analyzing network designs and protocols: I analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks, all of which impact the security of cyberspace.

Concentration in Critical Infrastructure

Specializing in Critical Infrastructure within my cybersecurity degree provides me with a deep understanding of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. These systems are integral to the functioning of essential services such as gas, electricity, and water utilities, as well as the production of everyday goods. This concentration allows me to explore how these systems differ from typical computer devices and how to protect them from threats ranging from hackers to nation-states. I am exposed to various aspects of these systems, from Programmable Logic Controllers (PLC) to nuclear power plants.

Objectives of the Concentration

Upon completing this concentration, I will be able to:

  • Evaluate risks of ICS and SCADA systems: I learn to assess the vulnerabilities and risks associated with these critical systems.
  • Explore federal agencies’ roles: I gain an understanding of the roles that various federal agencies play in protecting the nation’s critical infrastructure.
  • Identify critical infrastructure components: I am trained to recognize the key components that make up critical infrastructure.
  • Determine solutions to mitigate threats: I develop the ability to identify and implement appropriate solutions to mitigate threats to critical infrastructure.

Conclusion

This comprehensive education in cybersecurity, with a focus on critical infrastructure, is instrumental in my journey to becoming a Critical Infrastructure Protection (CIP) Professional. The knowledge and skills I acquire through this program not only enhance my credibility but also prepare me to contribute effectively to the protection and security of our nation’s vital systems.