Discussion Post: Cybersecurity
Examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture
a) Explain the cybersecurity culture.
b) Describe and explain the IRB process.
c) Identify technologies to log, monitor and audit networks and systems.
The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.