#1
While reviewing the NICE Workforce Framework, I think I’ll focus on being a
Cybersecurity Policy and Planning. Cybersecurity requires the ability the one that
appeals to me the most because it’s important to know every step to identify
something in the system that could be a threat to a corporation or government. On the
On the other hand, the Executive Cybersecurity Role doesn’t appeal to me because the
responsibility to maintain security within the cyber realm requires time and action to prepare everyone.
#2
In cybersecurity, empiricism relies heavily on evidence data to assess any vulnerability and risk involved with cyber threats like breaches or malware from hackers. Determinism is to fully understand how these cyber threats are caused and how to know what causes them in the first place. In addition, it is important to be aware of these potential threats and develop measures to combat them. Parsimony is to focus on making a problem within data simpler to use and avoid mistakes during cyber threat analysis. Objectivity is when having a balanced perspective during the analysis or policymaking and not letting any biases or personal opinions get in the way of crucial decision-making. To put it in perspective, all of these principles are indeed similar to cybersecurity because their main goal is to preserve frameworks to investigate and study to serve cybercriminal activities based on credible data. These principles help revamp the validity, make it efficient, and stay true to core cybersecurity practices.
#3
While reviewing the article, I can say that the amount of data branches happening across America is outrageous. According to Privacy Rights Clearinghouse (2020), it states that multiple states are receiving a large influx of reports about data branches that affect billions of users daily. What does this mean that if the problem is not being resolved then it’ll continue to become a substantial problem for the users? There were ways to combat this type of problem as organizations around the world started implementing stricter policies that will help to prevent data from being breached by unknown entities from the dark web.
Work Cited
Privacy Rights Clearinghouse. “Data Breaches | Privacy Rights Clearinghouse.” Privacyrights.org, 2020, privacyrights.org/data-breaches.
#4
Maslow’s Hierarchy of Needs is mostly about cybersecurity, being mostly professional in cybersecurity, and deepening the understanding of effective remission strategies to counter these risks at each level. For one, Self-Actualization is becoming the best version of oneself. For example, having the ability to motivate others who have the same goals as you can help bring out that potential to improve knowledge in any field. Second, Esteem Needs is the desire to accomplish something in life no matter how hard that goal truly is. For instance, all of us have our ups and downs when it comes to achieving our desires, but it takes courage and dedication to reach them. These things help anyone to become more confident within themselves to accomplish their desires. Belongingness and Love Needs are the desire to be loved and
appreciated by friends, families, and coworkers. Everyone in this world wants to be in a place where they feel a place of acceptance. Safety Needs is to need freedom and protection from dangerous entities that could cause physical harm to one safety and security. One example is to always have multi-factor authentication, stronger passwords, and to keep hardware updated. Physiological Needs are to ensure that systems and data itself is always critically protected from unauthorized use. According to Hopper (2024), the key takeaway is that every need has its own traits and actions speak about the person’s needs for something. In the end, Maslow’s Hierarchy of Needs, makes someone to be management, responsible for their actions, and understand their desire to achieve it all.
Work Cited
Hopper, Elizabeth. “Maslow’s Hierarchy of Needs Explained.” ThoughtCo., 2024,
www.thoughtco.com/maslows-hierarchy-of-needs-4582571.
#5
#6
When it comes to identity, whether it’s about academic resources, journals, articles, or other materials. I think that looking into the website URL and comparing it to the fake one. The differences are there. It is just that people are missing. According to Zach (2024), the ramifications of these websites pretending to be legitimate ones could include significant charges for being fraudulent and using the name of an already established company. It’s important to note that these fake websites deceive internet users into thinking that they’re real, but sadly, they aren’t. These companies that are solely with this scandal should be punished to the fullest extent of the law.
Work Cited
Zach Lakovics. (2024, September 11). 5 Recent Examples of Fake Websites | Memcyco. MemcyCo. https://www.memcyco.com/5-recent-examples-of-fake-websites/
#7
#8
#9
#10
#11
#12
#13
#14
While reviewing the site, I can say that the 5 worst violations ever committed are bullying, false identity
online, the use of not their own images, operating on people networks without their consent, harassment,
and stealing video or audio from YouTube The reason why these five are bad is because they are illegal to
take something that aren’t really theirs. They violate copyright laws that said that any company or
organization that copies from the original source of the owner can be sued, which forces them to make
key changes to match with the owner’s IP. In the end, I learn about these illegal things makes me not to
approach them at all and makes me want to report them to the authorities immediately.