The motive I rank number 1 is political. I am not a political person, so it seems very pointless to me. The motive I rank 2 is recognition. People say all publicity is good publicity, but being recognized for doing… Continue Reading →
Maslow’s hierarchy of needs suggest that all humans have needs that exist on a hierarchy. The first level is physiological needs which includes food, water, warmth, and rest. I use technology all the time to order food online to meet… Continue Reading →
The website PrivacyRights.org is a site that can help researchers study the causes and effects of data breaches. Researchers can use the data breach notification to understand each state’s definition of a breach and what laws are in place as… Continue Reading →
How do the principals of science relate to cybersecurity? There are six principals, and they all relate in some way. Some principals are easier to relate to cybersecurity than others. Determinism can be used to describe a company that wants… Continue Reading →
The NICE Framework is a resource that establishes a common ground that describes cybersecurity work no matter where you work at. I would be most interested to working in the implementation and operation of cybersecurity. This area is where I… Continue Reading →
© 2025 Haleem Mitchell — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑