Problem
1) Reflecting on the lab exercises you completed, how do these techniques apply in day-to-day cybersecurity operations?
2) Consider the regulatory requirements surrounding privacy and security of information you learned about this week. Using an industry with which you are familiar, explain the laws that regulate information security in this business sector. What types of security operations and practices do these laws translate to?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.