Elizabeth Figueroa

Author efigu003

Module 1 Journal Entry

The NICE Workforce Framework categorizes cybersecurity roles into seven categories:Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend, Analyze,Collect and Operate, and Investigate. Personally, I find the “Protect and Defend” category mostintriguing. The idea of actively safeguarding systems… Continue Reading →

The “Short Arm” of Predictive Knowledge

When navigating the development of cyber-policy and infrastructure amidst the uncertainties posed by predictive knowledge, it becomes essential to adopt a cautious and adaptable approach. Instead of relying solely on predictive models, policymakers should emphasize agility and resilience in their… Continue Reading →

Opportunities for Workplace Deviance

The emergence of cyber technology has significantly expanded the scope of workplace deviance. With the widespread adoption of digital platforms, employees now have increased opportunities to partake in various illicit activities with enhanced ease and anonymity. For instance, the accessibility… Continue Reading →

Protecting Availability

Several protections and measures I would implement to safeguard the availability of my systems would be data backups and disaster recovery, load balancing, and redundancy and failover mechanisms. By implementing redundancy for critical systems and services focuses to ensure continuity… Continue Reading →

CIA Triad

The Foundations and Evolution of the CIA Triad in CybersecurityThe CIA triad, consisting of Confidentiality, Integrity, and Availability, is a foundational modelguiding information security policies within organizations. Confidentiality involves restrictingaccess to sensitive information, integrity ensures data accuracy and trustworthiness, andavailability… Continue Reading →

NIST Cybersecurity Framework

Organizations can gain several benefits from using the NIST Cybersecurity Framework. The Framework provides a systematic and structured approach to managing cybersecurity risks, helping organizations enhance their overall cybersecurity posture. It facilitates effective risk management by identifying, assessing, and prioritizing… Continue Reading →

© 2025 elizabethfigueroa — Powered by WordPress

Theme by Anders NorenUp ↑