Posts

Flywheel Strategy For Information Security

Image
      In this past week's module, we discussed the Flywheel strategy, and how it'll correlate with my field of study; Information Security to get to my "One Thing". You may ask "What is the Flywheel strategy and your One Thing". I'll gladly explain, the Flywheel strategy is broken up into 3 parts buildup, breakthrough, and fly another way to describe it, is the short, mid, and long-term goals that'll help me get to my One Thing, which is the one goal I want to achieve in my future career that is to become Chief Information Security Officer.     First, my buildup is between 2024-2029 to first graduate with my bachelor's that I will obtain next year. Next, gain experience through internships, and get exposure to know what it's like to work in the field. Whether it's in person or remote, the knowledge I gain from it will prepare me for when I get a real job. While being an intern having the ability to have a relationship with the company...

Entropy In Information Security

Image
      In this week's module 4 we looked at the entropy in Information Security. You may ask what is entropy? Well, entropy in information security is used to produce random numbers that are used into making security keys to protect data while being stored or in transit. In my blog, I will be going through the connection of entropy, paradigm shift, and S-curve within Information Security.           After reviewing and completing this week's module we were to write a blog about entropy in our field of study . I will be focusing on the tools created to be used in information security and how the business as a whole will perform. It may be easy to create tools, but it's not easy to use a tool that didn't stop you from hackers getting into your data. Therefore, every tool needs to be tested thoroughly providing the utmost online security while on the web or just having your computer/laptop on. Which someday I will be the one c...

Dematerialization on everyday life

Image
      In this week's Technology for Leading and Learning Module 3 we went over the Law of Accelerating Returns by Ray Kurzweil. A brief overview of The Law of Accelerating Returns is Kurzweil's ability to predict modern advances will become smarter than humans. The law also builds up on Moore's law and is composed of the growth of technology at an exponential rate, and it builds on itself. Therefore, these stages were measured by using the 6D. What are the 6D's? The 6D's are Digitization, Deception, Disruption, Democratization, Dematerialization, and Demonetization a chain reaction of technological progression, a road map of fast development that led to a big disruption and occasion created by Steven Kotler and Peter Diamonds, and how the impact of Dematerialization exponential technologies has transformed the world.     My primary focus on this week's learning is Dematerialization. Dematerialization is the process by technologies that starts off ...

The Overview Of Week 2

Image
      As week 2 of the course comes to an end what I have gained from this week; Module 2 is the use of Adobe Express having the ability to create graphics, collages, and many others. Furthermore, the Study of Moore's Law and its Significance and how it's been used to highlight the rapid change in information processing technologies. Lastly, the usage of google scholar has the ability to have valid and reliable articles.     First off, Module 2 has definitely opened my eyes to newer research and teaches especially the use of Adobe E xpress. I was able to gain knowledge of the use of photoshop, and the ability to edit photos that'll meet my expectations within a couple of minutes. Having every option such as removing backgrounds to adding a filter within Adobe Express was pleasing instead of taking hours to understand a different editing application and figuring out where the editing/templates are at. Furthermore, Adobe Express has so many sizes to...

Welcome to my blog: My Journey In Technology for Leading and Learn

Image
Hello all,      I am Andrew Ngo, I am currently working on my BA in Information Science with a concentration in Information Security at USF. I got my AA at Hillsborough Community College and wanted to further my education at a university. This is my second semester at USF and I honestly love it even though my classes are online it's just been a dream school of mine. What made me have an interest in Information Science is at first I wanted to be a computer engineer, but there's just so much math, so I did some research and I went towards Information Science with a concentration in Information Security because one, required less math, it caught my eye after reading about it, made me excited to learn the whole background of InfoSec and I want to be the best at it. I want to protect company data from being hacked by online hackers, and also to have the ability to create a product to protect serious information. I will do everything in my will to protect information from being...