nstructions
One of the fundamental tasks of a cybersecurity professional is protecting the organization’s data. There are many things to think about when trying to protect data and plan for potential threats.
In your journal, write about how cryptography is important to cybersecurity. Describe the differences between data in motion and data at rest. Be certain to explain how threat modeling can be used to help protect the organization.
Your entry should be at least two paragraphs long.
Overview
Journals are private and between you and the instructor only. Approach these activities as an opportunity to reflect upon and apply what you learn each week based on the assigned readings, discussions, and activities. As a successful professional, you will need good reflective and writing skills. Journal activities offer you the opportunity to develop these skills further. The journal entries in this course are graded separately.
Prompt
First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.
In your response, be certain to address the following critical elements:
Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
Voice: Write in a style that is appealing and appropriate for the intended audience and use a consistent voice that is evident throughout.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount