Journal Entry 6
Here’s a comparison of three fake websites i made up and their real counterparts, highlighting what makes the fake sites stand out as fraudulent: What Makes Fake Websites Fake: Fake websites often have misspelled domains, unusual domain endings (like .info or .net), and lack SSL encryption (no padlock symbol or HTTPS in the address bar)….
Article Review 1
Introduction A thorough analysis of the literature on Advanced Persistent Threats (APTs), their behavior, and detection techniques can be found in the paper “A Systematic Literature Review on Advanced Persistent Threat Behaviors and its Detection Strategy” by Nur Ilzam Che Mat et al. This essay offers an improved strategy that combines vulnerability evaluations with…
Journal Entry 5
My ranking for the motives. 1. For Money: Since money is a major motivator for many different kinds of crime, I considered financial gain to be the most sensible purpose. Because cybercriminals may swiftly amass substantial wealth, there is a clear-cut justification for participating in illicit activity. 2. Complex Motivations – Cybercrime is not an…
Journal Entry 4
Technology and Maslow’s Hierarchy of Needs are related in a number of ways. At the physiological level, applications for grocery delivery and temperature-controlling smart home systems provide for fundamental necessities like food and comfort. Digital technologies such as home security systems, VPNs, and antivirus software safeguard personal information and guarantee physical security in order to…
Journal Entry 3
Researchers may use PrivacyRights.org’s information to learn more about data breaches by looking at individual cases, the sectors involved, and the techniques used to get sensitive data. This site offers comprehensive reports that list the kinds of data affected, the quantity of records exposed, and the origins of the breach. Through the examination of these…
Journal Entry 2
Cybersecurity is strongly related to scientific ideas like experimentation, observation, and prediction. The scientific approach is applied in cybersecurity to recognize, evaluate, and lessen dangers. Security professionals, for instance, monitor network activity, look for irregularities, and make predictions about possible dangers. In order to identify weaknesses, they subsequently put these theories to the test using…
Journal Entry 1
My interest is sparked by positions in cybersecurity that integrate leadership, education,and strategic thinking, according to the NICE Workforce Framework. The fact that jobs likecurriculum development, executive cybersecurity leadership, and cybersecurity policy andplanning includes developing organizational strategies, influencing laws, and training people in arapidly changing industry makes them unique. It is very tempting to have…