The network visualization and Vulnerability Detection course was particularly exciting for me. I did, however, have some expectations of advanced visualization techniques involving statistical graphs and creating unique visuals to describe abnormalities in network environments using customize code and products. My expectations, however, were over-complicating the reality of the field today being fairly mature and having more than enough products to meet these organizational needs. It would a be a profuse waste of an organizations time and resources to utilize a cyber security professionals skills to "reinvent" the capabilities of network visualization and monitoring tools available today.
I felt that reviewing and including the final project as part of this section was a great way to highlight the take-aways I had working through this course and as a way to remind me in the future of my duties a cyber security professional. The first takeaway, was it is my ethical duty to utilize existing technologies to accomplish organization goals of vulnerability detection when they are a wiser choice than it is to invest in an unknown or customized solution. Second, as a cyber security professional who has worked with a lot of the tools this course required reminded me of the advances in the open source tools available, but also that there is a significant total cost of ownership to using these tools because of the amount of time required to become fluent in their installation, and use. Finally, my professional and ethical considerations which relate to network visualization and vulnerability are that the continuous evaluation of an environments network activities is critical to detect attacks as they happen. More importantly, however, is that a sufficient response plan and recovery process should be created to be used with any solution to detect attacks.
I felt that reviewing and including the final project as part of this section was a great way to highlight the take-aways I had working through this course and as a way to remind me in the future of my duties a cyber security professional. The first takeaway, was it is my ethical duty to utilize existing technologies to accomplish organization goals of vulnerability detection when they are a wiser choice than it is to invest in an unknown or customized solution. Second, as a cyber security professional who has worked with a lot of the tools this course required reminded me of the advances in the open source tools available, but also that there is a significant total cost of ownership to using these tools because of the amount of time required to become fluent in their installation, and use. Finally, my professional and ethical considerations which relate to network visualization and vulnerability are that the continuous evaluation of an environments network activities is critical to detect attacks as they happen. More importantly, however, is that a sufficient response plan and recovery process should be created to be used with any solution to detect attacks.