CYSE 201S Journal 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.             The site shows information regarding data breaches across the United States, we well as the kind of breaches, the state where they happened, the companies with…

CYSE 201S Journal Two

Explain how the principles of science relate to cybersecurity                 Cybersecurity relates to science because it is by nature an interdisciplinary study, with its roots stemming from different aspects of the sciences. It’s the fusion of computer science, and the need for security from those who would abuse other computer systems for their own selfish…

CYSE 201S Journal One

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The NICE Framework, short for The Workforce Framework for Cybersecurity, is a resource that helps employers recruit, train, and evolve their cybersecurity…

CYSE 201S Journal 1

Attributes of a good theory The attributes of a good theory are easy to define, yet hard to quantify in terms of the intended goal, and how to research it. This gives it certain difficulty that even seasoned and experienced researchers encounter when developing new theories or reviewing old theories that may have held weight…

CYSE 300 Discussion Board 15

Cybersecurity education and training are provided in a variety of ways.  These include online/face-to-face courses, online self-study (e.g., Skillsoft Skillport), reading textbooks/periodicals, and video presentations.  Of the various approaches, which do you feel is the most effective?  Are there any recommendations you could provide to help improve the ways that cybersecurity knowledge is conveyed? I…

CYSE 300 Discussion Board 14

What avenues should an aspiring information security professional use in acquiring professional credentials?  Cite resources and references that backup your recommendations.  You can watch the following videos to help answer this topic: Expect Career Success with CompTIA Security+ Links to an external site. Top 10 IT Certifications for Security Cleared Professionals Links to an external…

CYSE 300 Discussion Board 13

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule establishes a national set of minimum security standards for protecting all electronic private health information (ePHI) that a Covered Entity (CE) and Business Associate (BA) create, receive, maintain, or transmit. The Security Rule contains the administrative, physical, and technical safeguards that CEs and BAs must…

CYSE 300 Discussion Board 12

The NIST CSF (URL: https://www.nist.gov/cyberframework) was developed to provide “a common language to address and manage cybersecurity risk in a cost-effective way based on business needs without placing additional regulatory requirements on businesses.” Do businesses and government agencies need to utilize such a framework to maintain a proper cybersecurity posture?  Can an organization mitigate cybersecurity…

CYSE 300 Discussion Board 11

Describe some actions or techniques that can be used to mitigate or stop the impacts of malicious applications?  Are some of these methods more effective than others?  Provide an example of a cyber attack that resulted from the execution of malicious code.  There are plenty of examples that can be queried from the Internet. There…

CYSE 300 Discussion Board 10

Internet Protocol Version 6 (IPv6) was designed to address the limitations of Version 4 (IPv4).  What cybersecurity-related enhancements have been incorporated into IPv6?  The adoption of IPv6 has been pretty slow across both the public and private sectors.  What reasons can you attribute to this?  Cite resources and references that support your assertions. IPv6 was…