Researchers might use this information to study breaches by being able to see data that is collected about data breaches in a wide range of ways that are interactive. The map that is provided by “Privacyrights.org” is a map of the USA that shows hotspots of reported data breaches country wide and shows which states…
Month: January 2025
Journal Entry 2
How the principles of science relate to cybersecurity is that they both serve as guidelinesfor further progression in the respective fields. At each principle although they are for morenatural sciences as opposed to social science that encompasses cybersecurity, we see that theprinciples are also applicable to help guide researchers in the work. A clear example…
Journal Entry 1
After reviewing the NICE Workforce Framework and taking a look at the Work RoleCategories and reading their brief descriptions of the repective work roles in each category, thereis some areas that I would like to focus more on in my career on. One of the first areas thatappeals to me is the category “Oversigh and…