Asia M. Wilson

Category Uncategorized

Journal 3: Privacy Rights Research

There are many ways researchers can effectively utilize the information available on the Internet about data breaches from different sites such as Privacyrights.org in many ways. First, using the trend analysis allows researchers to track changes in different frequencies, types,… Continue Reading →

Journal 2: The Principles

he principles of science include experimentation, observation, and hypothesis testing. These principles weigh on cybersecurity heavily by continuous observation. This is essential to cybersecurity because it watches network behavior and naming different anomalies. When including experiments, it can stimulate attacks… Continue Reading →

Journal 1: NICE Framework

NICE Framework The first position that caught my eye was the cybercrime investigator position. I found it very intriguing how as a cybercrime investigator you would be responsible for watching things that happens in the cyberspace which includes incidents and… Continue Reading →

Newer posts »

© 2025 Cyber World — Powered by WordPress

Theme by Anders NorenUp ↑