CYSE201S Journal Entry (4) Maslow’s Hierarchy of Needs to Technology

Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. Above is the Maslow’s Hierarchy of Needs. While the original creation of the hierarchy was not intended to relate to the digital experiences of society. The overall…

CYSE201S Journal Entry (3) Studying Data Breaches

Prompt: Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? The information provided by the given site aids in the research of data breaches in different ways. One is by giving specific categories of the different areas of data breaches. These different categories are…

CYSE201S Journal Entry (2) Principles of Science & Cybersecurity

Prompt: Explain how the principles of science relate to cybersecurity The principles of science are as follows; Relativism, Objectivity, Parsimony, Empiricism, Skepticism, Ethical Neutrality, and Determinism. When talking about relativism the principle stems from that all things are related. Therefore applying this to cybersecurity can come in many different examples. A couple of examples are…

CYSE201S Journal Entry (1) NICE Workforce Framework

Prompt: Review the NICE Workforce Framework. Are there specific areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The NICE Framework is a national resource that provides guidance to those who wish to develop their cybersecurity workforce. The composition…

The Human Factor In Cybersecurity

There are two main factors within cybersecurity. The first factor is the obvious factor which is technology and computer networks. The second factor is the humans behind said technology and their computers. Most people believe that technology plays the biggest role in cybersecurity when in actuality it is the human factor that drives threats and…

Cybersecurity in the Biological Sciences Industry

Given your Week 5 readings associated with Cybersecurity in the Biological Sciences, as well as your knowledge gained to date, what mitigation strategies or techniques would you implement to safeguard your lab? Why? What would these strategies accomplish? After looking over this week’s readings and doing a little independent research I find the topic of…