CYSE 201S Entry 7

Human Systems Integration Memes With HSI, security is designed with the user in mind. Each individual plays a role in protecting a digital environment that they’re a part of. While a dog might be an exaggeration, the below image invokes the notion that everyone plays a role in the products of Human Systems Integration. They’re…

CYSE 201S Entry 6

Fake websites compared to real websites. Abcnews.com.co : You can identify this fake website as it’s common for fake websites to attempt fool users by mimicking real websites. You spot this by noticing the added “.co”. Amazonstorepro.com : This is another example of a website trying to piggyback off the domain name of a widely…

Article Review 1

Anthony Thompson Professor Diwakar Yalpi CYSE201S September 28thth 2023 “A Comparative Analysis of Money Laundering Crimes in Indonesia through Cryptocurrency” International Journal of Cyber Criminology By Reda Manthovani June 2023 Introduction The article provides a comparative analysis of the legal frameworks in Indonesia and other nations, particularly the United Kingdom, pertaining to the regulation of…

CYSE 201S Entry 5

Motives for cybercriminal behavior ranked from worst to best explanation: After being provided 7 articles about cybercrime, each accompanied by a potential motive for the criminal behavior, I’m asked to determine which proposed motivations best explain the criminal behavior. I’ll rank them 1 (worst explanation) to 7 (best explanation). 1. Boredom is the explanation that…

CYSE 201S Entry 4

How Maslow’s Hierarchy of Needs relates to technology, with elaboration on digital experiences. Maslow’s Hierarchy of Needs is a conceptual framework which refers to categorized human needs in a hierarchical structure. It explains that humans are motivated to satisfy their needs in a structured order. The most basic and fundamental needs are first. Then as…

CYSE 201S Entry 3

Data breach information on privacyrights.org and what researchers might learn from it? The website privacyrights.org has a comprehensive, sortable database of data breaches in the United States. The dataset goes back to 2005 and has been normalized through February of 2022. You can filter the data by date range using a tool provided by the…

CYSE 201S Entry 2

How do the principles of science relate to cybersecurity? Science is a loaded term. It can mean a lot of different things depending on the context in which it’s used. Fundamentally, science describes the accumulation and pursuit of knowledge. More precisely, it describes the pursuit of this knowledge by means of a specific process that…

CYSE 201S Entry 1

Cybersecurity areas I’m most and least interested in: Digital forensics is an area that I have a lot of interest in. Digital forensics experts analyze and extract information from compromised systems that can be used as evidence in criminal justice proceedings. I enjoy learning and thinking about criminology and law, so this would be a…

Journal #13

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? The short arm of predictive knowledge refers to the difficult challenge of anticipating what the future holds. In certain circumstances, situations evolve in a steady and predictable way. There is a wealth of data to draw from and…

Journal #12

How does cyber technology impact interactions between offenders and victims? Cyber technology allows offenders to attack victims from remote, hidden locations. In the past, if someone wanted to steal your money, they would need to physically rob you, impersonate you or coerce you in some way. Today, we access our money using digital tools accessible…