My rankings in order from most interesting to least is 1. For money 2. Revenge 3. Political. 4. Multiple reasons 5. recognition 6. Entertainment 7. Boredom I ranked For Money as the number 1 motive for cyber criminals because I believe that money is the goal for most cyber criminals. Cyber criminals do what they…
Module 4 Journal
Maslow’s Hierarchy of Needs explains that our needs might alter throughout time. We will concentrate on the upper-level needs once the lower-level needs have been met. We all have laptops, telephones, printers, and/or smart wearable technology, for instance, which satisfies our basic necessities. Additionally, the fundamental gadgets will come with security and safety features including…
Module 3 Journal
The approaches used in social science research can be used in cybersecurity study strategies. Surveys, experiments, archival research, field studies, and multimethod research are some of the techniques used. Researchers should employ archival research to process the obtained data, according to the downloaded data. Numerous industry sectors, including BSF (Financial and Insurance Services), BSR (Retail/Merchant…
Module 2 Journal
The science of applied cyber security. In other words, experts in the subject frequently employ established knowledge and recent scientific findings to produce practical applications, frequently in the form of technology. Through the use of a social science framework, the research of cybersecurity can be conducted using scientific approaches. The science principles include relativism, objectivity,…
Module 1 Journal
I would like to focus on protecting and defending. “Protect and Defend” would be the most appealing area to me because I enjoy problem solving and using my skills to defend threats. The least appealing area to me is “Operate and Maintain” because I believe that the jobs in this specific area would not be…
The Human Factor in Cybersecurity
Chief Information Security OfficerA chief information security officer is a senior level executive in a company responsible for establishing and maintaining the information security strategy. They are also in charge of managing threats both internal and external and creating plans to anticipate new threats.If I Was CISO If I earned the role as CISO in…
Opportunities for Workplace Deviance
Cyber technology has created so many jobs and has had many advantages in the workplace. Such as improve security, communication, and networking. Cyber technology has also created opportunities for workplace deviance. One example of workplace deviance is if staff/employee try taking a picture of private information or sending out mass emails trying to sabotage another…