Journal Entry #1

09/02/21

Watch this video and write a paragraph about how Ann’s behavior is related to the need for cybersecurity.  In addition, pay attention to the way that technological changes increased cybersecurity risks.  By watching the video you will see that cybersecurity requires an interaction between human behavior and technology.

Ann is shopping on ‘shoppingcart.com’. On this website, she is already giving and saving her information in their database. Regarding the email for the voucher, Ann could have used cybersecurity to prevent her loss of data and funds. If the voucher was from the shopping site, (with the right cyber knowledge,) she would know that they would not need her information again to use the voucher. Since she was not aware of that, she was a victim of both her data and money. Technological changes have increased cybersecurity risks as it is much easier to save and store information for future use. Whatever company it is that holds your information is vulnerable to attacks, meaning that your data is as well. Of course there are things and people in place to defend those vulnerabilities, but technology is always developing and so are attackers.


Review the NICE Workforce Framework.  Are there certain areas that you would want to focus your career on?  Explain which would appeal the most to you and which would appeal the least.

The NICE Workforce Framework includes seven categories that take up 33 specialty areas that are broken down into 52 total ‘work roles’. These categories represent certain functions in the cybersecurity workforce. These functions are: Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Depend, and Securely Provision regarding system/network development. I can say that I am personally drawn toward the ability to communicate effectively when writing and speaking, or explaining my research or work to a third party clearly. Being able to operate and maintain a system also appeals to me, as I would need knowledge of computer networking concepts and protocols. There isn’t much that is unappealing that I at least know of at the moment, but if anything, knowledge of telecommunications concepts are somewhat foreign to me, so I am not sure of those.