Strengthening the Weakest Link: The Importance of a Human-Centered Cybersecurity Model The human-centered cybersecurity model prioritizes human behaviors and interactions with technology to complement technical solutions like firewalls and encryption. Noble (2018) research shows that human cyber errors are responsible for 80-90% of security breaches in the U.S. and the U.K. (p. 74). These mistakes…
Category: CYSE201S Journals
Week 6: Journal Entry 6
Spotting the Red Flags: How to Identify Fake Websites and Avoid Cyber Scams According to Forbes, there are currently 5.35 billion internet users, and that number is expected to grow to 7.9 billion by 2023. Cybercrime is a numbers game. If cybercriminals can get one-half of one percent or just .5% of internet users to…
Week 5: Journal Entry 5
Ranking Motivations for Cybercrime: Exploring the Complex Drivers Behind Cybercriminal Behavior I have ranked the following motivations for cybercrime from what makes the most sense to the least. Attached to each motivation is the article link used to provide examples for each motive.
Week 4: Journal Entry 4
Maslow’s Hierarchy of Needs Through the Lens of Technology: Connecting Human Experience to Digital Growth Maslow’s Hierarchy Maslow’s hierarchy of needs is a theory that identifies human needs broken down into a pyramid with five layers. The first two base layers are basic needs, physiological, and safety. Physiological needs, belongingness/love, and esteem make up the…
Week 3: Journal Entry 3
Analyzing Data Breach Trends and Insights: Exploring the PRC’s Role in Cybersecurity Research Privacy Rights Clearinghouse (PRC) provides data breach information in the United States. Users can view breaches by the Key Insights Timeline, Category, State, or chronological order. Researchers can use this information to analyze trends, assess impacts, or conduct case studies. By performing…
Week 2: Journal Entry 2
The seven scientific principles of relativism, objectivity, parsimony, empiricism, skepticism, ethical neutrality, and determinism align with cybersecurity. Relativism provides the understanding that all things in the cybersecurity field are related; changes in one system change things in others. Any change in societal, educational, political, technological, criminal justice, critical infrastructure, or healthcare systems will change cybersecurity….
Week 1: Journal Entry 1
After reviewing the NICE Workforce Framework, I’ve identified areas that interest me and others that are less appealing. Given my limited knowledge of cybersecurity, I am less interested in the Work Role Categories of Oversight and Governance (OG) and Design and Development (DD). These categories seem to focus on legal and program development aspects rather…