{"id":212,"date":"2023-02-22T19:03:08","date_gmt":"2023-02-22T19:03:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/?p=212"},"modified":"2023-04-25T11:34:47","modified_gmt":"2023-04-25T11:34:47","slug":"nice-framework","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/2023\/02\/22\/nice-framework\/","title":{"rendered":"NICE Framework"},"content":{"rendered":"\n<p>Overall, I find the NICE framework to be very intriguing. It&#8217;s a colorful catalogue of specific areas and aspects in which cybersecurity careers can be performed. While, I believe all to be useful in most aspects, in terms of my own opinion and tastes, I believe the &#8220;Oversee and Govern&#8221; portion to be the least interesting. It is almost entirely due to the fact that I am nowhere near as knowledgeable about cyber processes as I need to be in order to oversee someone else performing a task, let alone leading a group. On the opposite end of the spectrum, I find the &#8220;Protect and Defend&#8221; portion to be the most suitable for me as of right now. Due to my previous internship with a cybersecurity department, that is the area I am most familiar with, and I enjoy it the most.  <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-content\/uploads\/sites\/32213\/2023\/04\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-content\/uploads\/sites\/32213\/2023\/04\/image-3.png\" alt=\"\" class=\"wp-image-213\" srcset=\"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-content\/uploads\/sites\/32213\/2023\/04\/image-3.png 500w, https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-content\/uploads\/sites\/32213\/2023\/04\/image-3-300x180.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Overall, I find the NICE framework to be very intriguing. It&#8217;s a colorful catalogue of specific areas and aspects in which cybersecurity careers can be performed. While, I believe all to be useful in most aspects, in terms of my&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/2023\/02\/22\/nice-framework\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/posts\/212"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/users\/25214"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/posts\/212\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/posts\/212\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/media?parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/categories?post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cguiscyse201s\/wp-json\/wp\/v2\/tags?post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}