CYSE 200T Journal #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create app that rates software. Yacht GPS software that is secure. Build a cybersecurity application. Ethical hacking. Research and development. Security auditing. Entrepreneur(create your own cybersecurity company). Create training courses. Unauthorized access prevention. Risk assessment for a company. Incident…
CYSE 201S Journal #4
Maslow’s hierarchy of needs is a model created to explain what Maslow argues are the 5 human needs: physiological needs, safety, love and belonging, esteem, and self-actualization. Technology is undoubtedly a large part of most individuals’ lives, with users getting younger every year; technology is changing the way that we interact with the world. The…
CYSE 200T Journal #4
A cybersecurity risk is the potential damage, loss, or exposure an organization or company is facing due to a cyber attack. Data breaches are one of the biggest challenges the United States is confronted with in regards to cybersecurity risks. There isn’t one country that isn’t vulnerable to cyber attacks; the U.S. and Iran face…
CYSE 200T Journal #3
There are many ethical issues that could arise when storing the information of individuals electronically. Confidentiality, integrity, and availability are the most important things to consider when protecting data. The electronic storage of an individual’s information could lead to the ethical issue of an employee stealing customer data without any protocols in place to detect…
CYSE 201S Journal #3
“Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?” There are many ways researchers could use information provided by PrvacyRights.org to study breaches. As stated on their website, PrivacyRights.org is a nonprofit organization that is on a mission to help data privacy be a reality for…
CYSE 200T Journal #2
Some majors offered by ODU that can be related to cybersecurity include but are not limited to psychology, criminology, economics, and engineering. The study of psychology in relation to cybersecurity can give us a strong grasp on how people interact with technology. Additionally, a lot of cybercriminals use the exploitation of human emotions and psychology…
CYSE 201S Journal #2
The principles of science that we refer to in relation to cybersecurity include relativism, objectivity, parsimony, empiricism, and determinism. Relativism addresses the interrelatedness of all things. In cybersecurity, relativism can be seen as the rise of cybercrime due to the increase in use of technology. Objectivity is a crucial component when studying cybersecurity crimes and…
CYSE 201S Journal #1
After reviewing the NICE Workforce Framework, I have an idea of what career paths sound appealing to me: exploitation analysis, cybersecurity management, and cyber defense analysis. I am open to the multitude of career opportunities and specialties that cybersecurity offers, so there aren’t many options that I saw that I thought were un-appealing. Regardless of…
CYSE 200T Journal #1
“Why are you interested in cybersecurity technology?” It is a strange experience to grow up in a time where technology is so easily available to anyone, including children; a time where everyone is so heavily reliant and attached to these devices, with such little forethought into the ramifications of no privacy or security. It is…