Human needs get satisfied by technology according to Maslow’s Hierarchy of Needs. Indispensable technical services including food delivery applications and health monitoring applications sustain my daily practical requirements at the physical level. I maintain both personal data safety and financial security through protected online banking services along with privacy features and dual authentications. Social media and messaging applications enable me… Read more →
Journal Entry 3
The accessible data found on PrivacyRights.org enables researchers to study data breach characteristics as well as their historical patterns. PrivacyRights.org collects details from data breaches that show both the extent of each incident as well as which records were compromised and what types of protected information was revealed together with the organizations responsible. Analyzing the data provided by PrivacyRights.org enables… Read more →
Journal week 2
The scientific method of observation testing and data evaluation provides the foundation for successful cybersecurity efforts. The same research methods apply to cybersecurity because security teams must study network behavior to find risks. In ethical hacking users test systems to find weaknesses exactly like scientists test their theories. Cybersecurity experts use real-life evidence collected from network actions and intrusion activities… Read more →
Journal week 1
The NICE Workforce Framework is all about various careers in cybersecurity which means protecting computers and information. Some jobs that might be interesting are, Collect and Operate which is gathering information to help protect systems from attacks and Investigate which involves enquiring into cyberattacks or security incidents to identify causes and measures against them. Perhaps the least exciting position is… Read more →
Cyber-Policy Development
Flexibility and resilience should take precedence over attempting to foresee every potential future threat in cyber-policy and infrastructure development. As cybersecurity threats change quickly and without warning concentrate on developing flexible systems that can react to a variety of situations. Building infrastructure with several layers of defense including intrusion detection encryption and strong disaster recovery plans is necessary to enable… Read more →
Workplace Aberration
In a number of ways cyber technology has opened doors for workplace deviance. Using company computers and internet access for personal purposes or participating in non-work related activities are some examples of how company resources are misused. This may lead to decreased productivity and improper use of company time. Cyberbullying and harassment are two more ways that technology has given… Read more →
CISO Trading
My approach with this would be duplicate systems would be set up. In the event that the primary servers fail this entails having backup servers ready to take over. For instance in the event that our primary server fails the backup server can take over and function without any disruption. This makes it possible for services to always be accessible… Read more →