PrivacyRights.org is one of many different websites that researchers may use to view publicly available information about data breaches. Researchers can utilize this information in many ways to learn more about the types of breaches and how they occurred. The data collected is not only important to researchers but also organizations. Understanding the methods used to…
Journal Entry 2 – How the principles of Science relate to Cybersecurity
I believe that the scientific principles of relativism, objectivity, parsimony, ethical neutrality, and determinism must be adhered to cybersecurity. Below are explanations I have for each scientific principle and how it relates to cybersecurity. Relativism – Technology drives changes in our world, and changes in our world drive the changes in our technology. That’s where…
Journal Entry 1 – NICE Workforce Framework Review
Implementation and Operation is one career path I would like to focus on. Some of the work roles within that field are, Data Analysis, Network Operations, System Security Analysis, and Technical Support. Those work roles pique my interest the most. One reason these work roles interest me is that keeping our operational systems running or…
NICE Workforce Framework Review
Implementation and Operation is one career path I would like to focus on. Some of the work roles within that field are, Data Analysis, Network Operations, System Security Analysis, and Technical Support. Those work roles pique my interest the most. One reason these work roles interest me is that keeping our operational systems running or…