NIKO FLORIDO

Category Uncategorized

Journal Entry #3

Q:  Describe four ethical issues that arise when storing electronic information about individuals. A: Privacy: Privacy is the first ethical issue that arises when storing electronic information about individuals. It refers to the protection of personal information from unauthorized access…. Continue Reading →

Journal Entry #2

Q: Select four other majors offered by ODU and explain how those majors relate to cybersecurity. A: 1) Information Technology- Cybersecurity and Information Technology (IT) are closely related. IT deals with the use of technology to manage and process information,… Continue Reading →

Journal #3

Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers use various information sources such as breach data, vulnerability data, attack data, survey… Continue Reading →

Journal #2

Q: Explain how the principles of science relate to cybersecurity A: Cybersecurity is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. The principles of science play a critical role in… Continue Reading →

Journal #1

The NICE Workforce Framework is a framework developed by the National Initiative for Cybersecurity Education (NICE) to help organizations understand and meet their cybersecurity workforce needs. The framework is divided into five main categories: Protect, Detect, Respond, Recover, and Operate…. Continue Reading →

Journal Entry #1

I remember growing up, watching action movies where the hacker would sit down behind the laptop and try to break a firewall so the action star could stylishly escape. I also remember in Sci-Fi movies where the hacker would save… Continue Reading →

© 2026 My E-Portfolio — Powered by WordPress

Theme by Anders NorenUp ↑