This meme depicts an adult on a social media app named “Instagram”, through the years Instagram has gotten better at showing you post that relate to posts that you’ve liked in the past from various user or organizations. This meme relates to human systems integration because the app has built a way to remember the…
Journal #6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
The first thing into spotting a fake website is the domain name, the domain name could look very similar but be different for example Bank of America which is an American bank, instead of just writing BankofAmerica.com they could put BankoffAmerica.com, the scammer added a “F” in hopes that the victim will not notice. Secondly,…
Article#1: Covid-19 Vs Cybersecurity: The New Normal
The article I chose to review was from the Journal of Cybersecurity called Cybersecurity when working from home during COVID-19: Considering the human factors. This article researched the lives of 27 Australian citizens men and women ages ranging from 25 to 72, in hopes of gaining an insight into their lives as they transitioned from working…
Journal #5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
7)Entertainment seems very malicious, yes it might be publicly available data but why go selling innocent peoples information when they haven’t done anything to make you want to sell there information. 3) Political, this theory seems very bad as the hacktivists can easily manipulate ones words and gestures using Artificial intelligence. This could totally mess…
Journal #4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.
Each level of Maslow’s hierarchy of needs related to my experiences with technology in many ways here are some of those ways. The first level psychological needs, I feel as if technology cannot be addressed through biological needs you cannot gain basic life necessities through technology in my opinion. Next is security and safety needs,…
Journal #3: How might researchers use this information to study breaches?
Researchers could use this information to study breaches because they get to see the analytics behind everything such as the numbers the state, gender such as male or female or non binary, and the ethnic background. Also it tells you what type of breach it was for instance medical information or was it cyber information…
Journal #2: Explain how the principles of science relate to cybersecurity.
The principles of science relate to cybersecurity in many ways. Relativism, all things are related this could mean the relationships between different networks to help a system be operable at home or in a work building. Objectivity, is used to advance knowledge and clothes until gaps that may be present period technology is ever evolving…
Journal #1:Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
The job that seems most appealing to me is Digital forensics, because it seems to come naturally, on a daily basis most people collect and analyze data without even realizing it. I like the process of putting clues together and collaborating with law enforcement to possibly put an end to a certain crime. The least…