Week 8 Journal Entry- How do you think media influences our understanding about cybersecurity Media which includes TV shows and movies do influence our understanding about a lot of different topics. Cybersecurity, especially hacking is usually exaggerated for the intensity and movie because of the conflict it creates. While cybersecurity and hacking are very important…
Week 6 Journal Entry: How to spot a fake website from a real website
Week 6 Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake. Well, I am unable to show examples…
Week 5 Journal entry
Review the articles linked with each individual motive in the presentation page or Slide #3. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. The motives I…
Week 4 Journal Entry Maslow’s Hierarchy of Needs in Technology
The Hierarchy of Needs is a idea in psychology developed by a American psychologist Abraham Maslow explaining the different levels that humans need in their life. Typically, the pyramid goes from low to high, with the lowest being the bare minimum they need and going up lists needs the people need and eventually should strive…
Week 3 Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Researchers could use this information to study breaches by seeing the data provided and connecting the attacks to the reasoning that they were committed. They could research the bank’s security systems and the attackers to see how they were able to get in the systems and how vulnerable these systems were before the attacks took…
Week 2 Journal Entry Explain how the principles of science relate to cybersecurity
The principles of science relate to cybersecurity as applied through the social science framework which adheres to the same scientific principles as those of the sciences. These principles include Relativism, Objectivity, Parsimony, Skepticism, Ethical Neutrality, and Determinism. Relativism can be understood as things being related, so most systems that we use in society are connected…
Week 1 Journal Entry The NICE Framework
The NICE Framework is a simple yet effective building block approach to organizing and communicating between Cybersecurity learners and experts. This is done by listing out different types of statements based on Task, Knowledge, and Skills of everyone in the field at that particular business. By doing this Framework in this layout it can help…
The Human Factor in Cybersecurity
BLUF As a Chief Information Security Officer, I would allocate as many funds as I could forthe basic training and use whatever I have left for the technology. Prioritizing importance ontraining is very helpful in cases of attacks or other malicious events. Technology is alsoimportant as a factor; however, you only need certain technologies to…
SCADA Systems
BLUF Supervisory control and data acquisition or SCADA refers to the industrial controlsystems and is the practice of protecting this system using a common framework. Theseprocesses usually refer to the modern industrial services such as water, natural gas, electricityand transportation. Vulnerabilities associated with these systems can have a dramatic impact oncritical infrastructures because of how…
The CIA Triad
Alexander ConradProfessor KirkpatrickFall CYSE 200TThe CIA TriadBLUFThe CIA Triad is a common model that is used by Information security in an organizationas a guide for people in information security to find and locate areas of concern. In terms ofauthentication and authorization, authenticity is proving who you say you are and authorizationis the given access once…