Author: atuck022

Journal Entry Three: Investigating Data Breaches with Available Information

As we can see from the data presented by PrivacyRights.org, the number of data breaches, and those affected, have decreased significantly since 2005. Researchers can utilize this public information to investigate data breaches by carefully analyzing the information that has been disclosed or leaked. This can include studying breached data sets, examining hacker forums, dark web marketplaces (where the stolen… Read more →

Journal Entry Two: Cybersecurity and The Principles of Science

In the twenty-first century, digital threats constantly evolve and security breaches are a common occurrence, these principles of relativism, determinism, parsimony, ethical neutrality, and objectivity play a significant role in shaping our approach to protecting digital arenas. Relativism reminds me of the importance of acknowledging the diverse cultural and ethical perspectives that influence cybersecurity. As I work in this field,… Read more →

Journal Entry One: NICE Framework

In my upcoming Cybersecurity career, the three categories of NICE framework that interest me the most are: Protect and Defend, Analyze, and Securely Provision. Active work on a watch floor (Protect and Defend) as a cyber analyst sounds the most appealing with plenty of action to boot. That position would create a work environment that changes daily which would keep… Read more →