Monday, June 3, 2013

Week 12 Wrap-Up


Past Blog Topics
 
IT Security interesting facts
Top Paying IT Security Jobs
Top Security Breach of 2012

      IT Security training
Information Technology Infrastructure Library
Security Education, Training, and Awareness

Personal Security
Securing Your Mobile Devices 

      Security for a Business 
Biometric Measures for Security
Threats-Vulnerabilities-Assets(TVA) worksheet and Ranked Vulnerability Risk worksheet
Business Continuity
Confidential Vs. Sensitive
Information Security

Introduction
New IT Security Blogger

Well now that my semester and Information Security Mgmt. class is coming to an end I would like to take some time out to discuss everything that I blogged about over the past 12 weeks.  I wrote about a variety of topics just because I didn’t want to stick with one realm of information security.  The topics that I chose to talk about came from a variety of sources online.  I believe that my topics would be helpful to a information security professional because they are all things that could be useful at some point.  Whether they are a student, new to a information security career, or looking to get into IT security they can find these topics helpful on any level.  For the next group of students to do blogs, as a word of advice, choose topics that interest you and do a variety of topics to keep it interesting.  I think when it’s something you’re interested in it will make it easier to type up your blog!  Good Luck!!   

No comments:

Post a Comment