Organizations can benefit using the NIST Cybersecurity Framework in countless ways. The beauty of the NIST Cybersecurity Framework is that it is designed to be interactive and adaptive into the unique environment of the organization using the framework as a guideline or enhancement to the security measures that they already have in place. What is…
Author: pnewt001
DISCUSSION BOARD: Going on a Job Hunt
In reading the article 50 Cybersecurity Titles That Every Job Seeker Should Know About , I noticed that computer engineering, philosophy, business , and also psychology would be needed to be skillful at many positions listed. Science, Social Science and even the Humanities come to my mind. I am very surprised in the amount of ethical hackers positions…
Opportunities for Workplace Deviance, an online class discussion
Cyber technology has created many opportunities both beneficial, and of course detrimental to the workplace. Cyber technology has created workplace deviance because time could be wasted, attention can be taken away from crucial tasks, and also cameras and recording devices could lead to some type of criminal activity if used to record personal or sensitive…
Journal Entry 15: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
The speaker Mr. Davin Teo presented a very interesting and detailed view of his profession of Digital Forensics Investigator/Consultant. I correlate the social sciences and this profession of a Digital Forensics Investigator needs to have an advanced understanding of people, motives and circumstances that the social sciences can provide insight and behavioral theories that would…
Journal 14: Eleven Things Internet Users do That may be Illegal. ( Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.)
In reading the required article for today’s journal entry, I believe the 5 most serious points are: All of the points on the list are threats, but these 5 are the worst in my opinion. I think the use of all of these could lead to illegal activity, or could cause harm. In reading cybersecurity…
Journal #13
Write a summary reaction to the use of the Bug Bounty policies in your journal. Bug Bounty policies are beneficial for all types and sizes of businesses. Hackers could come from diverse backgrounds, and operate at different price points according to experience. By employing different hackers through the Bug Bounty experience, this could lead to…
Journal Entry #12 Read”SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
In reading the “Sample Data Breach Notification Letter” I thought of the Laissez-fare economic theory – where the government shall not affect Laissez-fare economic theory – where the government responds to particular events that happen, but does not in any way offer up how to prevent these same types of events in the future. Another…
Journal Entry 11: How Cybersecurity Analyst Job Relates to Social Behaviors
In watching the video required for feedback, I took special notice of social interactions she detailed for an entry level Cybersecurity Analyst. She takes note of community involvement, networking and even volunteering to gain insight and experience in the cybersecurity field. I agree with her take away points regarding that, and in terms of social…
Article Review #2
Name: Pearl Newton Date: March 20th, 2024 Cybersecurity Education Program for Internet Users with Limited English I will be detailing my understanding of the article The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study by Authors Fawn T. Ngo, Rustu Deryol, Brian Turnbull, and…