Journal #1
After reviewing the NICE framework, and the variety of specialty areas associated with each category, I found myself drawn the idea of working withing the area of protect and defend. The idea of conducting vulnerability assessments, penetration testing, or just testing new software or hardware appeals to me the most since it seems to be the most hands-on, and interesting from my perspective. I would have to say the area that appealed to me the least was the oversee and govern category. While I don’t mind being in a leadership position, this are seems to be the most boring in terms of everyday responsibilities (from my perspective currently). All of the other areas appear to be more active, while a management position appears to be more of directing others.
Journal #2
The principles of science tie together very nicely with cybersecurity it many ways. The principles of science include things such as observation, testing, and improvement on their experiments. These principles apply to cybersecurity as well, as observation comes into play when observing incoming data to monitor networks, and decent any threats. In science, continuous testing is done through their experiments, and similarly, cybersecurity constantly tests their models through various methods like penetration testing, or vulnerability assessments. Through the cycle of continuous testing on their models, and experiments, both fields improve on their respective models by analyzing the data the get back, and making adjustments as necessary. Lastly, both science, and cybersecurity utilize interdisciplinary studies by have collaborations between many different fields, for cybersecurity this includes fields such as law, and computer science.
Journal #3
By using, and analyzing the information regarding data breaches, found on privacyrights.org, researches will be able to study data breaches by analyzing specific aspects of various data breach laws in each state. The information available will allow researches access to information such as biometric information, medical information, paper records, and other encrypted information. This information would be able to help those researching data breaches, to contribute any findings in the data to different companies, based on where their state is located, and help them to form a great security policy for themselves, and be in compliance will all the various laws.