CYSE 201s

Journal Entries

1) Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Some of the focuses in the NICE framework that I feel like appeal to me include Operate and Maintain, which is to provide support towards secure systems to prevent any malicious threats. Some of the specialty areas within this include Network services and technical support.Another focus includes protecting and defending, which identifies, analyzes and gets rid of threats that pose a danger to the users organizations. The reason I chose this is that this would fit within my dream job of a security operations center analyst, which uses cybersecurity techniques to defend their users’ information against hackers. 

2) Some of the focuses in the NICE framework that do not appeal to me include Investigation, which some of the specialty areas include cyber investigation, the reason I would not be as interested in this is that in my career I would rather be interested in defending systems rather than finding hackers.

Explain how the principles of science relate to cybersecurity.

The principles of science relate in many ways to cybersecurity. an example include relativism, which can be defined as “All things are related example the changes in one system lead to changes in other systems.” This can be related to cybersecurity as due to the internet age everything is connected to cybersecurity for example, if there was a hack into the health system it would lead to a hack and a loss of information it would fall into the cybersecurity sector to prevent this another example would be the economic system, as if a company were to be hacked and important information got leaked it could lead to a loss in there stocks, which again falls on cybersecurity to prevent.

3) Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? 

Researchers can use this data provided by privacyrights.org to study breaches by seeing the types of data breaches, the locations of data breaches and the organizations of the breaches. First, is the types of data breaches some examples include CARD, DISC, HACK, PHYS. As this can be important for researchers to see what is the most popular type of hacking which is done by Hacking. Next, is the location of data breaches, as this is important because it shows where the locations of the breaches are coming and can give researchers more information like why is it happening in this spot? Finally, researchers can use this data provided to see the organizations of the breaches, this is important as it shows what organizations get hacked the most and can show the types of organization that are getting hacked the most. For example we can see on the website the current most hacks are done to banks, this can be used as data to researchers who can use this information to make questions like why are banks the most popular spots for breaches?