There are seven principles of science. They are relativism, objectivity, parsimony, objectivity, skepticism, ethical neutrality, and determinism. Relativism can be applied to cybersecurity by the relation of different concepts. For example, the cause of climate change can be attributed to the rise in technology and the destruction of trees to modernize our society. The intention of cybersecurity is to address sustainable ways to utilize technology and hinder our impact on the planet by offsetting emissions. Objectivity can be applied to cybersecurity by sticking to the facts and not allow opinion to influence our research. For example, the lack of women going into technical careers, such as cybersecurity, computer science, or information technology, can be biased in a male’s perspective. The important takeaway is to present the information without adding subjective viewpoints. Parsimony means that ideas should be simple to understand for the reader. In cybersecurity, parsimony may not often occur because it can be difficult to describe concepts based on natural behavior. For example, a kid may decide to engage in cyberbullying, but it doesn’t necessarily mean that he lacks self-control or wants to assert dominance over others. It may be a societal factor where the kid is pressured from his peers to join cyberbullying to get their recognition. Though, the information should be understood, so that people can test the validity of it. Empiricism is relevant in cybersecurity because it strives to explain concepts using experience and not rely on personal thoughts. For example, a reliable report would feature statistical data from the experiment and leave out any personal statements, so it can be credible. Ethical neutrality is maintaining a balance between crossing unethical/ethical lines and practicing ethical standards in cybersecurity. For example, consent is important for research because no one wants their information to be given out unless he/she is willing to provide testimonial services. Finally, determinism is prominent in cybersecurity, so actions can lead to known consequences. This is a principle that guides professionals to incriminate criminals. A person who steals confidential information can be charged a heavy sentence, especially if it is government related secrets. The person who commits the actions are prepared to face the consequences, and the professionals can anticipate the criminal’s mindset to plan their next move.