#1
Review the NICE Workforce Framework. Are there certain areas thatyou would want to focus your career on? Explain which areas wouldappeal the most to you and which would appeal the least.Workforce Framework for Cybersecurity (NICE Framework) | NICCS(cisa.gov)
Read More#3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. PrivacyRights.org seemed to be a site dedicated to notifying companies of new attacks that are possible, have happened, and also laws that companies should be aware of. On top of all these main features of the site it had a database of all past attacks on companies. This database had the name of the company, the state it was in, the date of the breach, type of attack, type of company, and location of the...
Read More#2
Journal EntryExplain how the principles of science relate to cybersecurity The principles of science relate to cyber security in multiple ways. One way it relates is the scientific method. There has to be studies done on cyber security, criminals, and users in order to predict how they will operate so cyber security professionals can protect a company from users and hackers. The best way to perform these studies is using the scientific method.
Read More