Journal 8

After watching the video “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” The profound impact of media, namely movies and television, on our cognition and comprehension of cybersecurity is a topic that has prompted my contemplation. The video critically analyzed hacking scenarios shown in movies and TV programs, highlighting…

Journal 7

These memes relate to the HSI framework by emphasizing the central role of users in the cybersecurity equation. The importance of user-centric approaches, education, collaboration, and participation is emphasized in order to improve cybersecurity practices and establish a more secure digital environment for all individuals.Individual Engaging in Typing Activity: “Enhancing Digital Security through Incremental Keystrokes.”…

Journal Entry 6

Fake websites frequently demonstrate irregularities in their uniform resource locators (URLs), substandard website design, and no authentic contact details. In addition, they may present alluring propositions that appear excessively advantageous. In contrast, authentic websites are affiliated with well-established companies, utilize secure HTTPS connections, and promote the well-being and satisfaction of users. It is imperative to…

Article Review 1

Review of “Victimization by Deepfake in the Metaverse: Building a Practical Management Framework” The article “Victimization by Deepfake in the Metaverse: Building a Practical Management Framework” explores the critical issue of deepfake-related interpersonal cybercrime in the emerging digital space known as the metaverse. This study gives helpful information about this current problem by using ideas…

Journal Entry 5

            After reviewing the articles, I think I would rank money first, then political, revenge, recognition, entertainment, boredom, and multiple reasons in this order.               For Money, This motive is placed Number one because financial gain is a major incentive for many individuals. The prospect of obtaining a tangible and immediate reward frequently serves as…

Journal Entry #4

            From an individual standpoint, technology has demonstrated its integration with Maslow’s hierarchy in several manners. During the COVID-19 epidemic, the utilization of Zoom technology served to satisfy my Love and Belonging requirements by facilitating connections with individuals who had significant emotional value in my life. Concurrently, the utilization of online courses offered by platforms…

Journal Entry Week 3

PrivacyRights.org is a reputable and dependable resource that provides comprehensive information regarding data breaches across a significant timeframe. The website effectively curates a comprehensive timeline of data breaches, encompassing relevant details such as the affected company, the kind of the breach, and the quantification of individuals impacted.By conducting longitudinal studies spanning several decades, researchers have…