Journal Posts
Week 1- Looking at the NICE Cybersecurity Workforce Framework, the areas that stand out to me most are Protect and Defend and Investigate. I like the idea of being directly involved in monitoring systems, responding to incidents, and figuring out how attacks happen. I feel like it would be meaningful, hands-on work where I can really make a difference and stay challenged. I’m also interested in the Operate and Maintain category since keeping systems running securely seems like a simple but still entertaining role for me to fill. The area I find least appealing is Oversee and Govern. While I understand how important policy and compliance are, I’d rather focus on the technical and problem-solving side of cybersecurity.
Week 2- Empiricism makes cybersecurity stronger by focusing on real evidence instead of guesses. By collecting data, like checking network traffic, tracking hacking attempts, and watching for weak spots, security teams can spot new threats early. This evidence also helps show if current protections, like firewalls or training, are actually working. For example, logs and reports can prove whether attacks are being blocked or if changes need to be made. Looking at real data over time lets teams adjust and create new plans to deal with changing attack methods. In simple terms, empiricism means using facts to make smarter choices, keeping systems safer in a practical and effective way.
Week 3- Researchers can use the information on PrivacyRights.org to study how data breaches happen and how they change over time. The site lists details like when the breach occurred, what type of organization was hit, how the breach happened, and how many records were exposed. By looking at these patterns, researchers can see which industries are attacked most often, what methods hackers are using, and whether the number of breaches is going up or down. They can also compare breaches before and after new security laws to see if rules make a difference. This helps forecast future trends and gives companies and policymakers useful insight on how to prevent data loss.