After completing this weekâ€™s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:
- Reflecting on the lab exercises you completed this week, how do these techniques apply in day-to-day cybersecurity operations?
- Consider the regulatory requirements surrounding privacy and security of information you learned about this week. Using an industry with which you are familiar, explain the laws that regulate information security in this business sector. What types of security operations and practices do these laws translate to?