Article Review 2

Article Review 2: Understanding the Connection Between Hackers and Their Hacks:Analyzing USDOJ Reports for Hacker ProfilesThis study’s research question aims to investigate whether a connection exists betweenthe age, gender, and nationality of hackers and the attributes of the hacks they carry out. Toachieve this, the research examines press reports from the United States Department of…

Article Review 1

My article review will be from the Journal of Cybersecurity titled, “Developing metrics to assess the effectiveness of cybersecurity awareness program”. This article explores an awareness program’s effectiveness on its audience by providing proposed metrics of which to base a programs effectiveness on in order to help companies make the best decision on choosing to…

PrivacyRights.org

Week 3 Journal Entry: PrivacyRights.org is a website that publicly lists information about data breaches. This website can be very useful for researchers in the cybersecurity field because of all the different information that can be taken from it. There are different filters on the homepage that dictate the date, location, and type of data…

NICE Workforce Framework

Week 1 Journal Entry: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The most desirable areas of the NICE Workforce Framework for me personally would be (in no particular order)…

The Principles of Science and Cybersecurity

Week 2 Journal Entry: Google defines science as, “the systematic study of the structure and behavior of the physical and natural world through observation, experimentation, and the testing of theories against the evidence obtained”, Using this definition it is clear see that the principles of science relate to cybersecurity in the way that most cyber…