Starting off with my physiological needs / basic needs would be video games, TV and internet access. Then having safety needs the basics of learning all passwords and safety to protect everyone. Belongingness and Love Needs/ psychological the needs of friends and family that’s all I need. Esteem needs/ psychological needs of having fun and…
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Researchers use this information about breaches to learn and better their systems. If a breach were to happen, it would expose confidential data to the public, ruining a company. Researchers can study this information on how it happens, where the weak points in the system are, and how to prevent these things from happening again.
Explain how the principles of science relates to cybersecurity.
The principles of science relate to cybersecurity among the basic principles of respect for integrity of knowledge, collegiality, honesty, objectivity, and openness. People in the cybersecurity field often use known facts and discoveries to create useful applications, often in the form of technology.
Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
A particular area I would like to focus my career on is system analysis because I like how they work on current organizations computer systems and procedures. Doing this will help the organization operate and do everything it needs to be more secure. Cyber investigation is one that appeals the least to me just because…
How has cyber technology created opportunities for workplace deviance?
First deviance is the fact or state of departing from usual or accepted standards, especially in social or sexual behavior. Now workplace deviance could occur easier in cyber technology because how most of the things you do is online through the web/cloud. There also could be more possibilities of it happening because it’s all online and…
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
I don’t think that the development of cyber policy should be weighed heavily on the use of predictive knowledge. Even tho it is good for projections it’s not entirely accurate all the time. This will make cyber policy development more reactive rather than proactive. When we start to over-predict things that’s when we over-correct things…
What benefit can organizations gain from using this framework, and how would you use it at your future workplace?
Benefits that an organization can get from using the NIST framework is it integrates risk management into their systems, it allows all organizations to protect themselves from having a disaster of an attack, and betters communication and decision making throughout the organization. The NIST framework can provide a guidance how to manage and reduce IT…