These are my journal edits for CYSE201S with what their prompts and my response to them

Journal Entry 1:

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas are most appealing to you and which are least appealing.

My Response:

Reviewing the NICE Workforce Framework, I can find many areas that I would want to
focus my career on. From the ones I find to be the most appealing for my career are
Defensive Cybersecurity under Protection and Defense, Cybersecurity Architecture under
Design and Development and Operational Technology Cybersecurity Engineering. I find
these areas the most appealing because they fall in line with my goals of wanting to get
into Defensive Security in my career. Defensive Cybersecurity has multiple different areas
that will help me analyze data to identify what is safe or unsafe within the network and act
upon it. OT Cybersecurity Engineering allows me to progress from taking in the information
from utilizing tools into creating and developing the tools themselves to better serve their
purpose and improve them over time. Cybersecurity Architecture in my opinion brings it all
together to manage and develop the entire organization’s IT Network and Data, taking in
the experience and knowledge of analyzing and developing into creating on a larger scale.

Journal Entry 2:

How does the principle of empiricism enhance the effectiveness of cybersecurity practices?

Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems.

My Response:

Empiricism is the idea that knowledge is derived from the senses, for a lot of cybersecurity
most of these senses would be done via sight in the idea of monitoring systems and
correctly identifying and distinguishing between a bad actor from a benign system. There is
more that can be done from my opinion. For example, security is not always technical and
in that would require keeping up with physical security which will require a tactile and
observant mindset to be aware of something going wrong in more than just sight but also
with touch or rather noticing something irregular with an physical environment.

Journal Entry 3:

Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches and forecast future data breach trends ? Enter a paragraph in your journal.

My Response:

In PrivacyRights.org You’re given a wealth of information in their site as it releases public
information about Data breaches. This information becomes invaluable to researchers due
to several factors, one of which is when and where new breaches happen, this alone while
useful doesn’t mean a lot of information until you also input the company affected and
what was used to breach it. This allows in real time to put into what hacking methods are
used and need to be defended against while letting consumers know what is going on with
a company they may do readily business with. Knowledge of the number of consumers
affected can also let in the sheer scale of who is affected which can help with relief in
letting consumers know to protect themselves through changing their passwords and
information that can be stolen from them. Lastly researchers can utilize this information
can help with predicting future incidents where an attacker might strike based on similar
systems akin to the ones attacked before and what hacking methods will be employed.