Module 2 Journal Entry – CYSE 201S

Define each of the principals of science in your own words. Then, give an example of how each of the principals relates to cybersecurity.

Analyze – Takes incoming intel and filters through it for information that is useful for intelligence. In the realm of cybersecurity, this is vital to make sure we don’t waste resources on information that is not needed. Threat analysis is a realm that assess activities of cyber criminals and foreign intelligence.

Collect and operate – Denial and deception operations and the collection of evidence to develop intelligence is key risks in this category. In cyber operation planning it takes needed cyber policies and creates plan needed to ensure cyber goals are kept.

Investigate – Investigates cyber events or crimes in reaction to vital technology. In the role of cyber investigation tools are used to gather information need for prosecution and intelligence gathering.

Operate and maintain – Provides the maintenance and support needed to ensure that needed technology is running smoothly. This can be seen in the role of a data administrator securing classified data.

Oversee and Govern – Direction is the main goal of this category. People who happen to fall within this scope delegates or leads in some way. This can be seen when a company has legal representation, or upper management within the workplace. When cyber threats occur, people within these positions are critical.

Protect and defend – Professionals in this category use their expertise to properly identify, analyze, and mitigate cybersecurity threats. This can be seen in the profession of Vulnerability Assessment and Management. In this career, the goal is to reduce the level of risk and this is done by policy compliance, reducing deviations, and creating needed policies to act as countermeasures during cyberthreats.

Securely provision – This portion of the NICE Cybersecurity framework is concerned with the creation of critical IT infrastructure. Everyday interactions are becoming digitalized and to maintain these networks the technology needed to facilitate them need to be designed with care.