Maslow’s Hierarchy consists of five levels within a triangle. The bottom level consists of our basic needs. Inside this is our safety needs which are security and safety. Also, we have Physiological needs with things like food, water, warmth, and rest. Next, we have our Psychological needs or our middle level. This level is made…
Author: gridg001
[Visit PrivacyRights.org] How might researchers use this information to study breaches?
From reviewing the website we can see that there are endless possibilities or vulnerabilities when it comes to stealing information, and how you get that information. Researchers should use this information to form an analysis on the most common types of information theft. By doing this researchers can find the most common ways of theft…
Explain how the principles of science relate to cybersecurity.
When talking about the Principles of Science, we know that, Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, Determinism, and Skepticism are all included. Relativism relates to cybersecurity through the fact that one change in a system might led to multiple changes in other systems. For example, with technological changes our health care system too changed. Objectivity…
Review the NICE Workforce Framework. Explain which areas would appeal the most to you and which would appeal the least. Are there certain areas that you would want to focus your career on? you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
When reviewing the NICE Framework mostly all of these could pertain to what I am looking into. Since I am looking at the broader area of cyber security instead of individual jobs that could suffice. Meaning I have not yet settled on an area because how much there is within this field. While learning about…
Cybersecurity in the Biological Sciences
When trying to safeguard information at a high-level such as digitized DNA, I would first look to assessing or identifying the lab to understand what functions are being used and the risks that come with them. Doing this would allow for us to firmly acknowledge the goals of what the lab needs. While understanding what…
The Legal System’s Response to Technological Advancements
With the ever-advancements of technology, I believe that our legislative bodies could do more by promoting to younger people within the United States, making sure all states have the same level of information, making it a priority for those around us to have firm knowledge of the newest technologies, and making sure the technology that comes…
CIA Triad
The CIA stands as the guide for many organizations. CIA is also known as Confidentiality, Integrity, and Availability. It is the function of these organizations’ security systems. This is designed to govern and evaluate how organizations handle information daily. You should know that this is not something that is bought but understood. Realizing what your plan…
NIST Framework
The NIST Framework offers a general understanding/guidelines to follow for all Businesses, Companies, and the Government. These guidelines can be customized to be exactly what jobs need to effectively defend and set strict measures to not allow for any hackers to get through. Jobs using this framework are minimizing the amount of cyber attacks that…