1.) Using unofficial streaming services is a big one for me as accessing movies, shows and or music through illegal websites is a huge risk to not only your device but you yourself as data can be stolen fast and… Continue Reading →
the article on bug bounty policies explains how these programs are becoming more and more popular and cost-effective strategies for Improving cybersecurity. The literature review discusses how ethical hackers are paid and incentivized to find system vulnerabilities before they can… Continue Reading →
This breach letter highlighted how data breach affects both businesses and their customers. In economic terms, cost-benefit analysis helps businesses with the value of cybersecurity investments against the potential loss financially that could occur from a breach. Another relevant theory… Continue Reading →
This article emphasized the importance of social cybersecurity in the new age of technology. It focuses on how attacks have been growing rapidly using social engineering and exploiting human behavior and societal issues such as misinformation. Unlike tradition cybersecurity, which… Continue Reading →
I scored 3 yes’s and was indicated as risky usage. I think that the items on the scale don’t relate to my use of social media that much because i mainly use it for entertainment as opposed to myself posting… Continue Reading →
The media has a big influence in how we as the audience view cybersecurity. Media often distorts or exaggerates things for the sake of entertainment such as hackers having incredible sense of ease when hacking and being able to break… Continue Reading →
For photo 2, I chose to write a meme for it saying ” trying to explain to your team why not using “Password123″ is more important than actual cybersecurity,” as this emphasizes the importance of good practice in creating strong… Continue Reading →
Identifying fake websites is crucial to protecting personal information as counterfeit websites often use fake URL’s impersonating legitimate websites such as apple as they offer unrealistic discounts and promise up to 90% off products which is not common on the… Continue Reading →
1.) for money makes the most sense as financial gain is a common driving motive behind cybercrimes such as fraud and hacking 2.) revenge is a strong motive as this can be in cases such as cyber bullying where one… Continue Reading →
Technology plays a key role in meeting and fulfilling our everyday needs. We used apps to order important items such as food or track health and fitness for basic necessities. Safety is a vital element of technology as antivirus software… Continue Reading →
© 2025 alovo001cyse201s — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑