There are loads of online users that fall for the scam of a fake website, so being informed and aware will highly reduce the chances of falling victim to scammers. The first thing to look out for is spelling; are there a bunch of spelling and/or grammatical errors? Next, users can take a look at…
Category: CYSE201S
Article Review 1
Article Review 1 In the article linked above, “Understanding the Connection Between Hackers and Their Hacks: Analyzing USDOJ Reports for Hacker Profiles”, a significant question was examined: what are the relationships between the age, gender, and nationality of hackers and the sophistication level of their hacks? Social science and cybercrime are undeniably interrelated, and…
CYSE 201S Journal #4
Maslow’s hierarchy of needs is a model created to explain what Maslow argues are the 5 human needs: physiological needs, safety, love and belonging, esteem, and self-actualization. Technology is undoubtedly a large part of most individuals’ lives, with users getting younger every year; technology is changing the way that we interact with the world. The…
CYSE 201S Journal #3
“Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?” There are many ways researchers could use information provided by PrvacyRights.org to study breaches. As stated on their website, PrivacyRights.org is a nonprofit organization that is on a mission to help data privacy be a reality for…
CYSE 201S Journal #2
The principles of science that we refer to in relation to cybersecurity include relativism, objectivity, parsimony, empiricism, and determinism. Relativism addresses the interrelatedness of all things. In cybersecurity, relativism can be seen as the rise of cybercrime due to the increase in use of technology. Objectivity is a crucial component when studying cybersecurity crimes and…
CYSE 201S Journal #1
After reviewing the NICE Workforce Framework, I have an idea of what career paths sound appealing to me: exploitation analysis, cybersecurity management, and cyber defense analysis. I am open to the multitude of career opportunities and specialties that cybersecurity offers, so there aren’t many options that I saw that I thought were un-appealing. Regardless of…