Journal Entry 5

Memes: Picture 1: Me on my coffee break ensuring that people are doing their part to make HSI efficient for the company. Picture 2: My dog mirroring the physical and living side of engineering to ensure cybersecurity is working.  Picture 3: My face after managing a team to ensure we humans aren’t getting overrun by…

Journal Entry 4

Multiple Reasons Money Political Revenge Entertainment Recognition Boredom Having one reason may have enough influence on an individual or group to do something but with multiple factors being in play, I find this to make the most sense. If there weren’t multiple factors in play the list would be as it is starting from 2…

Journal Entry 3

Looking at Maslow’s Hierarchy of needs we have 3 sections broken down into 5 tiers. Within the basic needs section, you have physiological needs and safety needs. Within the psychological needs section, you have belongingness and love needs. Finally, within the self-sufficient needs section, you have self-actualization. In relation to technology, basic needs can be…

Journal Entry 2

In order to relate cybersecurity to the principles of science, we can brake them into these categories: Relativism Objectivity Parsimony Skepticism Empiricsim Ethical Neutrality Determinsim Relativism shows us how cyber security is relative to many aspects of our life such as sociology, criminology, and technology. Being able to relate cyber security to these examples of…

Journal Entry 1

The top three areas I would consider the most and appeal to me include  Operate and maintain Collect and operate Oversee and Govern My main career focus is to obtain a System Administrator position right out of college. I hope to pursue a master’s degree on top of this in Cyber security as well as…