Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. Ranking the motives from 1 to 7 based on the articles:…
Category: CYSE201S Journals
Journal entry 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs is a psychological theory that categorizes human needs into five levels, often designed as a pyramid from bottom to top. The levels…
Journal entry 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Researchers can analyze the data breach information to identify patterns and trends over time. They might examine the frequency of breaches, industries most affected, common attack vectors, and the…
Journal entry 2
Explain how the principles of science relate to cybersecurity. The principles of science are important in cybersecurity, as they provide a structure and analytical approach to understanding, preventing, and responding to cyber threats. Professionals in the field of cybersecurity often develop theories regarding possible system weaknesses, attack routes, or vulnerabilities. To continue to prove and…
Journal entry 1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The NICE Workforce Framework is divided into several categories, each containing specialty areas, work roles, and associated tasks. I would want to focus…