Journal Entry- Week #8
After watching the video, I feel like movies and TV really mess up how people see hacking and cybersecurity. Everything is always so dramatic with people typing super fast,...
After watching the video, I feel like movies and TV really mess up how people see hacking and cybersecurity. Everything is always so dramatic with people typing super fast,...
Photo #8: Meme: “When the system says ‘create a strong password with 12 characters, symbols, and numbers’ and now you have to remember it without writing it...
When it comes to fake websites versus real websites, the differences are actually pretty clear once you know what to look for. Fake websites often have weird URLs that...
Module 5 Journal Entry For this Journal Entry, I ranked the individual motives based on what I honestly think makes the most sense in real life. 1. Money I put money...
Maslow’s Hierarchy of Needs connects to my experiences with technology in a realistic way. At the physiological level, Wi-Fi honestly feels like a basic need. As a...
While exploring Privacyrights.org, I noticed how much information is publicly available about data breaches, from the companies affected to the types of data exposed. This...