week 12 – journal entry 12

the economic theories are making something to secure the personal information a little bit better where it can’t be hacked easily and also creating a system where hackers can’t only go so far if they did hack where we can catch them. social science theory are the third parties which is causing the system to get intruded. Also securing it because the...

Read More

Week 11- Journal Entry 11

The job seems very much of a remote job that I think i would pursue. The social aspect of the job seems very slim unless you are working in office. Doesn’t seem too much of networking unless at conventions. But the overall aspect of the job seems great. Various levels of jobs starting at the entry level of 95k a year.

Read More

Week 11 – journal entry

The military is trying to enforce a safe way to distribute information without it being hacked or weakened. So many hackers across the world that almost anything no matter how safe it is can be touched by an unknown. Thats why combining with national security should help way more with securing things.

Read More

Week 10 – Journal Entry 9

no no no no no?? no no no no

Read More

week 8

The media influences the look on cybersecurity as if it’s very vulnerable and not as secured as may seem but also at times it is very powerful.

Read More

week 7

pp.pptx

Read More

week 6 – cyse201s

You can tell a website is fake due to a weird URL or domain name, and the design quality. Looking at reviews and ratings can definitely show you if the website is fake especially if there are multiple reviews with a short time limit with unusual usernames.

Read More

journal entry 5

Money 2. revenge 3. multiple reasons 4.boredom 5.polticial 6. recognition 7.entertainment These make the most sense to me ranking wise , some of these i really didn’t know where to rank them at times.

Read More

week 4 – journal Entry 4

physiological needs relate to technology because you need to eat. using technology can help buy ordering food on online services. Along if you need somewhere to stay you can always book a hotel. safety needs refer to technology because if you need help you can always call the police or someone to come help you. love needs refers to technology because you can...

Read More

week 3

Researchers can you use the website to study breaches because there is actual scientist studying this information. They can use this information to track the different types of data under the topics they are looking for. Many options of resources for data are on this site that contain data to be used for research. Researchers should take as much as they can...

Read More