Journal Entry Eight

The video titled Hackers Rates 12 Hacking Scenes in Movies and TV| How real is it? The video was very interesting and informative on the concepts of cybersecurity. I think the media can influence society’s understanding of cybersecurity in positive and negative ways. I want to discuss how I think the video demonstrates how society…

Journal Entry Seven

The first photo shows a student typing an essay at 11:59 p.m., knowing that the essay is due at 11:59 p.m. The second photo is of a student staring at all the assignments they have to complete by Sunday at 11:59 p.m. The third photo is of a student knowing that they submitted the worst…

Journal Entry Six

The topic of acknowledging the components of a fake website and a real website is very important. Society recognizes that cyberthreats occur due to the fact that a person clicked on a link. There are methods an individual or organization can use to verify if a website is real or fake. A component to look…

Journal Entry Five

I learned a lot of information from reading these articles about the rise of cybercrime, such as the reasons people commit cybercrimes and the negative outcomes data breaches cause for individuals or organizations. These articles were interesting to read. I have a few interesting opinions about each individual motive. I think most of these motives…

Journal Entry Four

Maslow’s Hierarchy of Needs model is used to determine how the components of humans’ motivation consist of different levels of needs. The levels of Maslow’s hierarchy include physiological, safety, love, esteem, and self-actualization. The physiological aspect combined with my experience with technology is interesting because of the sleep aspect of this hierarchy. I tend to…

Journal Entry Three

PrivacyRights.org provides information about data breaches around the world. Researchers can use this information on this website to learn about current trends in data breaches, the locations where most data breaches occur around the world, and more. Researchers can also evaluate common methods that most hackers use to send cyberthreats to a network, such as…

Journal Entry One

The NICE Workforce Framework provides information on specialty areas and work roles that cybersecurity professionals can focus on. The NICE Workforce Framework departments that intrigue me are exploitation analysis, cyber defense infrastructure support, software development, and cyber operational planning. These areas are interesting to me because the components of each department consist of analyzing data…

Journal Entry Two

The field of cybersecurity relates to many disciplines, such as criminal justice, health care, education, and more. The principles of science relate to cybersecurity due to the fact that social sciences and natural sciences are similar. Social sciences involve the study of society. Natural science includes the study of science involving the natural world, which…

Discussion Board: Going on a Job Hunt

Cyber Intelligence Specialist: analyze cyber threats and defend against them. Cyber Intelligence Analyst Salary and Job Description (und.edu)Links to an external site Digital Forensics Analyst: Examine data containing evidence of cybercrimes. Digital Forensic Analyst Job Description: Salary, Duties, and More at CLIMB (climbtheladder.com) Links to an external site Cryptanalyst: Decipher coded messages without a cryptographic…

Write-Up: The Human Factor in Cybersecurity

Introduction  A chief executive is an individual who manages an organization’s funds and goals. A chief executive’s responsibility varies depending on the company’s status, such as being the largest company or a small company. Humans play a big role in the field of cybersecurity. Professionals need to manage tasks carefully. Therefore, the procedure I would…