Maslow’s Hierarchy of Needs states that “all humans have needs that exist on a hierarchy.” As we satisfy our lower-level needs, we begin to focus on meeting our upper- level needs. According to the hierarchy, the lowest level would be psychological needs. I use technology to fulfill this role by ordering groceries oE Instacart and…
Author: ahank004
Journal Entry 2
The principles of science relate to cybersecurity by playing major roles in understanding security challenges. Determinism is a principle of science that states behavior is caused or influenced by preceding events. In cybersecurity, this principle can relate to the predictability of a system’s behavior based on its weakness. According to determinism if you understand the…
Journal Entry 14
Reading this article informed me that people are committing illegal acts without even knowing, some maybe harmless while others aren’t. The most serious violation would be bullying and trolling. Bullying online can have serious implications as it can cause harm to the victim, verbal abuse is still abuse. Next would be sharing others personal information…
Journal Entry 13
Based on the article the bug bounty program is a solution for improving cybersecurity. They are a security measure for companies. The report mentions that the number of vulnerabilities found isn’t impacted significantly by the company size, bounty offered, or reputation, variables that would otherwise inflate the costs. Due to a trend of fewer reports…
Journal Entry 11
Cybersecurity Analysts are the first line of defense that monitors the network and responds to incidents. They play an important role in protecting our online privacy from threats. The main theme is the importance of digital security in our world. A theme that arises in the presentation is the high demand for cybersecurity analysts along…
Journal Entry 6
There are a few ways to tell the difference between a fake website and a real one. You have to be careful because some are setup to be very similar but the first thing to take a look at would be the domain name. Unlike real websites that use common extensions like .org or .com…
Journal Entry 3
PrivacyRights.org is a legitimate organization that provides resources and information about data protection and privacy rights. If researchers wanted to study breaches this website would be very helpful in aiding in their research. This website gives information on data breaches dating all the way back to 2002. Although it is not a complete record of…
Article Review 2
The Use of AI in Cybercrime Article Review #2 Ayanah Hanks November 15, 2024 Introduction Artificial Intelligence has done many things for numerous industries but it has also opened new opportunities for cybercrimes. In the article, “Understanding the Use of Artificial Intelligence in Cybercrime,” the authors talk about the complex relationship between AI and cybercrime….
Journal Entry 1
After looking at the NICE Frame for Cybersecurity and discovering all the differentcategories in the field, there are a few roles I would be interested in working in. Oversightand Governance would be a role I’m interested in, especially because it deals withmanagement, and I like stepping up into a leadership role and guiding others. Protectionand…