spectrophotometer lab & physical chemistry notes
25 FEBRUARY 2025 | 34/100 DAYS OF PRODUCTIVITY
started the day with physical chemistry lab!
then went to work - waiting on a couple of other departments to send me stuff, so had a chill day
evening bioethics lecture!
had a dance rehearsal after class
then finished a couple of problems for physical chemistry
🎧: everybody else is doing it so why can't we? - the cranberries 📚: ulysses - james joyce (i WILL finish it by the end of the month)
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
Cybersecurity is all about securing technology and processes - making sure that the software, hardware, and networks that run the world do exactly what they need to do and can't be abused by bad actors.
The CIA triad is a concept used to explain the three goals of cybersecurity. The pieces are:
Confidentiality: ensuring that information is kept secret, so it can only be viewed by the people who are allowed to do so. This involves encrypting data, requiring authentication before viewing data, and more.
Integrity: ensuring that information is trustworthy and cannot be tampered with. For example, this involves making sure that no one changes the contents of the file you're trying to download or intercepts your text messages.
Availability: ensuring that the services you need are there when you need them. Blocking every single person from accessing a piece of valuable information would be secure, but completely unusable, so we have to think about availability. This can also mean blocking DDoS attacks or fixing flaws in software that cause crashes or service issues.
incident response
digital forensics (often combined with incident response in the acronym DFIR)
reverse engineering
cryptography
governance/compliance/risk management
penetration testing/ethical hacking
vulnerability research/bug bounty
threat intelligence
cloud security
industrial/IoT security, often called Operational Technology (OT)
security engineering/writing code for cybersecurity tools (this is what I do!)
and more!
I view the industry in three big chunks: vendors, everyday companies (for lack of a better term), and government. It's more complicated than that, but it helps.
Vendors make and sell security tools or services to other companies. Some examples are Crowdstrike, Cisco, Microsoft, Palo Alto, EY, etc. Vendors can be giant multinational corporations or small startups. Security tools can include software and hardware, while services can include consulting, technical support, or incident response or digital forensics services. Some companies are Managed Security Service Providers (MSSPs), which means that they serve as the security team for many other (often small) businesses.
Everyday companies include everyone from giant companies like Coca-Cola to the mom and pop shop down the street. Every company is a tech company now, and someone has to be in charge of securing things. Some businesses will have their own internal security teams that respond to incidents. Many companies buy tools provided by vendors like the ones above, and someone has to manage them. Small companies with small tech departments might dump all cybersecurity responsibilities on the IT team (or outsource things to a MSSP), or larger ones may have a dedicated security staff.
Government cybersecurity work can involve a lot of things, from securing the local water supply to working for the big three letter agencies. In the U.S. at least, there are also a lot of government contractors, who are their own individual companies but the vast majority of what they do is for the government. MITRE is one example, and the federal research labs and some university-affiliated labs are an extension of this. Government work and military contractor work are where geopolitics and ethics come into play most clearly, so just… be mindful.
A wide variety of things! You can get a good idea by browsing the papers from the ACM's Computer and Communications Security Conference. Some of the big research areas that I'm aware of are:
cryptography & post-quantum cryptography
machine learning model security & alignment
formal proofs of a program & programming language security
security & privacy
security of network protocols
vulnerability research & developing new attack vectors
Cybersecurity seems niche at first, but it actually covers a huge range of topics all across technology and policy. It's vital to running the world today, and I'm obviously biased but I think it's a fascinating topic to learn about. I'll be posting a new cybersecurity masterpost each day this week as a part of the #StudyblrMasterpostJam, so keep an eye out for tomorrow's post! In the meantime, check out the tag and see what other folks are posting about :D
you don’t need perfect conditions to start. you just need to start. five minutes of focus is better than waiting for motivation to come.
friendly reminder that notes do look like a mess 90% of the time and it’s ok!!
mid sem week wasnt so fun 🚬📚🎧🕯️
participated in my first undergrad research conference🖤
Skipped yesterday because I didn't feel like a human and didn't do much today because I had work and workout class afterwards.
Done
30 minutes of Network+ exam videos
Did the dishes
Went to taekwondo class
Workwise: three meetings and a metric ton of emails
To Do
Sweep the floors
Do the dishes again
Review study guide for Network+
Hi! I’m V (pronouns: she/they). I’m a network engineering and security major, expecting to graduate with my bachelor's in 2026. I also work full time as an IT consultant for my day job. I currently go to school online. I would love to connect with more friends in the IT/cybersecurity/comp sci space.
DNI -minors
16/03/25 || Sunday
Have I ever shown my desk during the day? It looks really cozy today haha.
Ur not stupid ur program is just hard
Network engineer in the making | 23 | USA | studyblr/bookblr/whatever
246 posts