Journal Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake Websites This fake UPS page has an unofficial URL and encourages users to navigate through the website through surveys and a “timer”. Pages like this may use logos to help…

CYSE 201S – Journal Entry 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Physiological needs: Mobile devices allow me to pay bills for basic needs, such as utilities, rent, or food, quickly and efficiently. Safety needs: Security systems…

CYSE 201S – Journal Entry 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. PrivacyRights.org provides researchers with legal overviews, reports, definitions, and data breaches in chronological order. Having access to this information helps researchers develop a strong foundation about the legalities concerning data privacy…

CYSE 201S – Journal Entry 2

Explain how the principles of science relate to cybersecurity. Cybersecurity is an interdisciplinary field composed of several disciplines that utilize social science principles for their research. Social sciences adhere to the same principles as natural sciences, therefore allowing cybersecurity to be studied through a social science framework. One of the simplest examples of a social…

CYSE 201S – Journal Entry 1

Review the NICE Workforce Framework. Are there certain areas that you would want tofocus your career on? Explain which areas would appeal the most to you and which wouldappeal the least. The areas in the NIST Workforce Framework I’d ultimately like to work in are Designand Development (DD) and Cyberspace Effects (CE). Both areas require…