examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture
Explain the cybersecurity cultureDescribe and explain the IRB processIdentify technologies to log, monitor and audit networks and systems