{"id":323,"date":"2024-08-05T01:22:00","date_gmt":"2024-08-05T01:22:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=323"},"modified":"2024-08-05T01:22:00","modified_gmt":"2024-08-05T01:22:00","slug":"module-5-journal","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-5-journal\/","title":{"rendered":"Module 5 Journal"},"content":{"rendered":"\n<p>The NICE framework is used by employers to develop their cybersecurity policy. I think that the<br>most important category of the NICE framework is protection and defense. I think that this is the<br>first line of defense for the network of the company. Making sure that the bad stuff does not get<br>in the network makes it easier to defend against attacks, this also includes a little bit of making<br>sure that employees know what to look out for. The defense part of this framework is after the<br>malware is also investigating cyber security events on the network and what to do so that it will<br>not happen again. The next important thing is design and development which is honestly a big<br>picture thing for the company. It involves pen testing and researching newer technologies in the<br>cyber security world if it works for the company. The third thing is investigation , this is on the<br>national side of things but with national investigation a company can see the types of malware<br>and threat attacks that can happen on a national scale. By knowing the type of attacks and how to<br>fix the issue a company will be able to be on the lookout. The fourth framework is<br>implementation and operation that includes maintenance and configuring. By making sure the<br>people have the right roles and then making sure that the employees are about to access the<br>application on the network which is very important to companies. The fifth framework is<br>cyberspace intelligence is important because it researches foreign actors and how they will affect<br>domestic technology. The sixth important framework is cyberspace effects which supports<br>cyberspace capabilities to defend force projection. Which means creating operation plans on how<br>to target cyber criminals or attacks. The seventh framework is oversight and governance. It is<br>important because in order for cybersecurity to work for a company it needs to be managed<br>effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NICE framework is used by employers to develop their cybersecurity policy. I think that themost important category of the NICE framework is protection and defense. I think that this is thefirst line of defense for the network of the company. Making sure that the bad stuff does not getin the network makes it easier&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/module-5-journal\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/323"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/323\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}