Journal 3: Privacy Rights

Researchers use public data gathered by Data Breaches to aid in the prevention of cyber-attacks as well as providing useful information to bring awareness to data breaches to consumers. The resources are massive, this is a perfect site for researchers to study from; whether you choose to become knowledgeable of recent law overviews (referencing for…

Journal 2: Explain how the principles of science relate to cybersecurity.

Cybersecurity is the practice of protecting computer systems, networks, and digital information. The principles of science can be related to cybersecurity as an applied science, which is defined as a general classification for the real-world application of scientific knowledge and research. Cybersecurity, applied physics, aerospace and communication are all examples of applied science. Other forms…

Journal Entry1: NICE Framework

The Workforce Framework for Cybersecurity, commonly referred to as the NICE Framework, is a nationally focused resource to help employers develop their cybersecurity workforce. It establishes a common lexicon that describes cybersecurity work and workers regardless of where or for whom the work is performed. The framework consists of 7 categories: Analyze, Collect and Operate,…

Workplace Deviance

According to Oxford dictionary deviance is defined as “the fact or state of straying from conventional or recognized standards, especially in social or sexual behavior”.  It is behavior that goes against organizational norms, for example a coworker bullying or hazing a coworker, viewing explicit content on company time, sharing company secrets with competitors, and sabotaging…

The Legal System Response to Technological Advancements

As technology advances, the need to regulate it becomes imminent and there are a couple of things that legislators can do to become more proactive to fill in the growing gaps on the legal side of things. The constant interaction with technology and analyzing various legal implications of possible innovations is a way that can…

The Human Factor in Cybersecurity

Trade-off is described as giving up one aspect or quality of something in order to gain another. The use of cybersecurity allows analyst to focus on the “prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its…