Analytical/Reflection Paper

Topic 1 — The CIA Triad

Mitigation Techniques

Connection to Next Topic

Topic 2 — The Human Factor in Cybersecurity

Definition

Example

Mitigation Techniques

Connection to Next Topic

Topic 3 — The NIST Cybersecurity Framework (CSF)

Definition

Example

Mitigation Techniques

Integrative Connection

Philosophical Discussion — The Short Arm of Predictive Knowledge

Conclusion

References

Appendix: Reasoning Notes

Leave a Reply

Your email address will not be published. Required fields are marked *