Technical Focus Areas
The practice of protecting systems, networks, and programs from cyberattacks aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
The analysis and technical support of identifying, creating, representing, distributing, conducting, adopting, and leveraging good practices in collaborative settings and organizational processes.
The use of models, including emulators, prototypes, simulators, and stimulators, either statically or over time, to develop data as a basis for making managerial or technical decisions.
The process of inspecting, cleaning, transforming, and modeling data to highlight useful information, suggest conclusions, and support decision making.