CYSE 201S – Journal Entry 5

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

CYSE 201S – Journal Entry 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Physiological needs: Mobile devices allow me to pay bills for basic needs, such as utilities, rent, or food, quickly and efficiently. Safety needs: Security systems…

CYSE 201S – Journal Entry 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. PrivacyRights.org provides researchers with legal overviews, reports, definitions, and data breaches in chronological order. Having access to this information helps researchers develop a strong foundation about the legalities concerning data privacy…

CYSE 201S – Journal Entry 2

Explain how the principles of science relate to cybersecurity. Cybersecurity is an interdisciplinary field composed of several disciplines that utilize social science principles for their research. Social sciences adhere to the same principles as natural sciences, therefore allowing cybersecurity to be studied through a social science framework. One of the simplest examples of a social…

CYSE 201S – Journal Entry 1

Review the NICE Workforce Framework. Are there certain areas that you would want tofocus your career on? Explain which areas would appeal the most to you and which wouldappeal the least. The areas in the NIST Workforce Framework I’d ultimately like to work in are Designand Development (DD) and Cyberspace Effects (CE). Both areas require…

CYSE 200T ePortfolio Entry #6

How do engineers make cyber networks safer? There are many angles cyber engineers can approach cyber networks to make them safer. Security mechanisms, such as implementing firewalls and authentication systems, help keep data stored in cyber networks secure. Agencies like FIDO work in conjunction with major companies in order to implement improved security protocols for…

CYSE 200T ePortfolio Entry #5

How can you tell if your computer is safe? There are several ways to tell if a computer is safe. Some giveaways that a computer has been compromised is an extremely sluggish performance, pop-ups, unknown programs being installed, and/or inability to access files. All of these signs can signal an infection and can be indicative…

CYSE 200T ePortfolio Entry #4

What are the costs and benefits of developing cybersecurity programs in business? Developing cybersecurity programs within businesses has both costs and benefits associated with it. Below we’ll explore both sides of the coin: Costs Monetary investment: This refers to the money that’s invested into the development of a cybersecurity program. This investment goes into acquiring…

CYSE 200T ePortfolio Entry #3

How has cyber technology created opportunities for workplace deviance? The emergence of cyber technology has indisputably made it easier to commit acts of workplace deviance. One of the most prolific acts of workplace deviance emerges from the improper use of corporate resources and misuse of sensitive data one has authorized access to. This is often…

CYSE 200T ePortfolio Entry #2

Describe four ethical issues that arise when storing electronic information about individuals. Confidentiality – One of the most prolific ethical issues surrounding the storage of data about individuals is the matter of privacy. Sensitive data is constantly being shared by individuals through third parties such as apps, instant messengers, and email. We expect this sensitive…