Week 2 journal entry

                For many years, the scientific community has utilized the scientific method to shape how we understand everything from atoms to how we understand how the universe works. This method moves in linear form from observations to hypothesis, then to theories, then to laws. Interwoven in these steps are experiments, calculations, data recording, and analyzing data.

                Computer networks are man-made, and there are many talented individuals who understand these intricate networks and how they operate. The scientific method can be applied to computer networks just the same as anything else we understand as humans. This method provides a structured, proven approach to identify, analyze and handle cyber-attacks and threats.

                The key to all of this is evidence, testing, data analysis and empiricism. Because computer networks are man-made, we have a better understanding of them versus something in the wild that was just discovered. That being said, it is crucial that we keep accurate records and a thorough understanding of networks in order to keep them safe and in working order.