Journal #8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. After watching the video “Rating Hacking Scenes, in Movies and TV Shows | Insider Analysis ” I’m struck by how media shapes our perceptions of cybersecurity. The way hacking is glamorized in films and television often…

Journal #6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? 3 Real Websites https://www.cdc.gov/index.htm https://www.cnn.com/2024/02/17/europe/putin-navalny-existential-threat-analysis-intl/index.html https://www.evertonfc.com/tickets/resale-guide 3 Fake Websites https://web.archive.org/web/20161201213424/http://abcnews.com.co/obama-executive-order-bans-pledge-of-allegiance-in-schools/ https://www.dhmo.org Home To tell apart fake websites examine the domain name closely for accuracy as fake websites might use variations or…

Journal #5

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. If I had to…

Journal #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslows Hierarchy of Needs is intertwined with our life experiences as well as technology.Technology plays a role in satisfying our physiological needs by providing access…

Journal#3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Researchers have the opportunity to study data breaches by analyzing trends, patterns, and characteristics of breaches over time using the information provided on PrivacyRights.org. By looking at factors like the industries targeted, intrusion methods, types of compromised…

Journal #1

Are there certain areas that you would want to focus your career on? For me, I feel like I am drawn to work roles that involve threat analysis and computer skills. I have always enjoyed more hands-on roles in jobs or school. These roles are exciting because they keep pace with the changing landscape of cybersecurity…

Journal #2

How the Principles of Science Relate to Cybersecurity. In the field of cybersecurity, science plays a role by providing guidance. Scientists rely on inquiry to gain insights, into threats, vulnerabilities, and defenses. They analyze patterns collect data and make informed conclusions to strengthen environments. The scientific method becomes a tool, for identifying weaknesses and developing…