Social Cybersecurity Journal Entry

The journal discusses the emerging field of social cybersecurity and its impact on national security. Social cybersecurity focuses on understanding and forecasting the effects of cyber-mediated changes in human behavior, social, cultural, and political outcomes, and building the necessary cyber infrastructure to protect society in a cyber-mediated information environment. It highlights the use of technology…

Social Media Disorder Scale

Completing the Social Media Disorder scale was an eye-opening experience. My score shed light on my relationship with social media, and it made me reflect on how much time and energy I invest in these platforms. Some items on the scale resonated with me, while others made me question my habits. It’s intriguing to think…

Fake Websites Vs. Real Websites

When identifying fake websites, there are several key indicators to look for. Fake websites often exhibit signs such as poor design with spelling and grammar errors, suspicious domain names (misspellings or unusual top-level domains) like SuperFastWeightLossPills.info, missing contact information, offers that seem too good to be true, and a lack of security features like HTTPS…

Tech & Maslow’s Hierarchy of Needs

Maslow’s Hierarchy of Needs, which categorizes human needs into five levels, finds resonance in my experiences with technology. At the base, technology helps fulfill our physiological needs by enabling access to food, water, shelter, and sleep-related resources. Moving up, it contributes to safety needs through security systems and online financial services. For love and belongingness,…

PrivacyRights.org Data Breaches

I looked into PrivacyRights.org to learn more about the kinds of publicly accessible data breaches information and wondered how scholars may make use of this priceless resource to research these breaches. The website, which serves as a comprehensive database of data breach reports, provides a variety of details, including information on the businesses affected, the…

NICE Workforce Framework

Anyone interested in a career in cybersecurity can consult the NICE (National Initiative for Cybersecurity Education) Workforce Framework. It offers a thorough analysis of the information, abilities, and skills needed for diverse cybersecurity professions. I can see some elements of the framework that greatly appeal to me and some that don’t, after examining it. One…

Principles of Science Relate to Cybersecurity

Introduction: Cybersecurity is a field that aims to protect digital assets, data, and systems from unauthorized access, cyberattacks, and potential threats. The principles of science play an important role in understanding, developing, and advancing cybersecurity practices. In this journal entry, we will explore how these principles, including the scientific method, data analysis, and evidence-based decision-making,…

The Human Factor in Cybersecurity

In this write up we discuss the importance of balancing employee training and cybersecurity technologies when managing a limited budget for cybersecurity. Prioritizing employee training as a well-trained staff can recognize and prevent cybersecurity threats. It is then essential to invest in crucial cybersecurity technologies like antivirus software, firewalls, and intrusion detection systems. Implementing additional…

The CIA Triad & Authentication/Authorization

In this write up we discus that the CIA Triad is a model used to define the three key elements of information security: Availability, Integrity, and Confidentiality. Authentication verifies a user’s identity, while authorization grants access to specific resources based on identity and permission. The triad and distinction between authentication and authorization are critical in…

SCADA Systems

In this write-up, we talk about SCADA systems and their role in critical infrastructure systems. It explains what SCADA systems are, how they are used to monitor and control processes in critical infrastructure systems, and the vulnerabilities associated with these systems. It also describes the important role that SCADA applications play in mitigating the risks…