The data provided by PrivacyRights.org has been already cleaned and normalized. Also, it is only data of publicly available information. Because of this, it does not represent all data breaches in the history of the USA. On the other hand, the data can be use to pin-point the data breach type and the type of…
Author: msant023
Journal Entry #2: Principle of Science and Cybersecurity
The scientific principle are relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. In the definition provided on the slides, Relativism can be interpreted as relation between things. How a change in one system affect another? In terms of cyber security and social science, how the constant bombarding of information overwhelms or changes people behavior? Many…
Journal Entry #1: NICE Framework
After reading through the NICE Framework, three areas appeal to me. First one, is digital forensics. The idea of following a process to preserve and analyze data in support of network vulnerability mitigation are of great interest to me. Second the Vulnerability assessment and Management, assessing risk and recommending counter measures, I consider interesting. I…