How the principles of science relate to cybersecurity

For this journal entry I will be talking about how scientific principles relate to cybersecurity. I chose to do my post on relativism, objectivity, and determinism. Relativism suggests that truth and morality are subjective and may vary based on individual perspectives or cultural contexts. In cybersecurity, relativism might be reflected in the diversity of ethical…

Maslow’s Hierarchy of Needs

Maslow’s Hierarchy of Needs is a psychological theory that categorizes human needs into a hierarchy, with basic physiological needs at the bottom and higher-order psychological needs at the top. Physiological need are the basic survival needs, such as food, water, and shelter. When it comes to the digital connection, access to technology has became one…

Data Breaches

How might researchers use privacyrights.org to study breaches? Privacyrights.org is a great database to use when studying data breaches. It has data dating back to 2005. You could use analyze this data to identify any anomalies or patterns. Since the database has its data split up by year you could use this information to identify…

NICE Workforce Framework Journal Entry

For me I think that I would lean toward the OPERATE and MAINTAIN category because I tend to like the technical side of the industry. Within that category I would probably enjoy the Systems Administrator. I think that I would enjoy this area because you are up close and personal to the software and hardware….