The NICE Workforce Framework is used as a resource by organizations to build effective cybersecurity measures. NICE consists of 7 broad categories that include several specialized areas: Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, Securely Provision. The Analyze category emphasizes critical thinking skills and problem-solving abilities. Individuals in…
Journal 1
The NICE Workforce Framework is used as a resource by organizations to build effective cybersecurity measures. NICE consists of 7 broad categories that include several specialized areas: Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, Securely Provision. The Analyze category emphasizes critical thinking skills and problem-solving abilities. Individuals in…
Describe three ways that computers have made the world safer and less safe.
3 ways computers have made the world safer Computers have impacted our education system completely. It has expanded the way we are able to access information using the internet. We are able to access online books, images, audio, and videos. Computers have improved our means of communication with one another. We are able to communicate…
How can you tell if your computer is safe?
Test your settings “The first tool in your arsenal is Microsoft Baseline Security Analyzer. This free tool examines your Windows and Office settings for any potential problems, especially contamination. First, MBSA will test your user account passwords and let you know if any account has a weak or disabled password, which is easy prey for…
How has cyber technology created opportunities for workplace deviance?
Deviance is described as “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior.” Workplace deviance happens much more frequently in the Cyber Technology field because it is easier to deviate from a traditional work environment by way of the internet. A traditional form of workplace deviance is…
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.
Consulting clients about their network security Yacht security system salesman Build safe areas to store physical security systems Electrician for secured networks Radar software specialist Sell special security frameworks to different companies Engineer for the department of defense Car gps software protection Uber cybersecurity specialist Regional manager at a cyber security firm IT support analyst…
Compare cybersecurity risks in the U.S. and another country.
United States “While cybercrime is an issue in the United States, it is also true that the United States is the country with the best infrastructure to tackle it and has the most cybersecurity firms in the world calling it home. The U.S. is cooperative when dealing with cybercrime worldwide and is relatively organized with…
Describe four ethical issues that arise when storing electronic information about individuals.
In cybersecurity, ethics is always a debate. There are four major ethical priorities for storing electronic information: privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Justice Samuel Dennis Warren and Justice Louis Brandeis define privacy as the right “to be let alone.” Another way I would describe it is an individual’s right to…
Select four other majors offered by ODU and explain how those majors relate to cybersecurity
Cybersecurity has a huge presence in many other majors here at ODU. Criminal Justice, for example, goes hand in hand with cybersecurity. With the growing rates of crimes carried out on the internet today, it is necessary for the criminal justice system to be well equipped for all potential cyber attacks. That’s where cybersecurity comes…
Journal #1
Cybersecurity has always sounded so fascinating to me. Defending areas of the internet from threats you can’t see or fully understand right away is extremely interesting to me. I have only just recently gotten into computers and learning their different functions and capabilities so I know this isn’t my forte, but I believe learning about…