Media influences our understanding about cybersecurity in various ways. For instance, many films have hackers hacking into some network, while others showcase people interpreting a live cyberattack. However, some films portray cybersecurity incorrectly, while others do it well. Some films show a hard drive with moving animation, but there are no animations of what files…
Week 7 – Journal Entry 7
Humans are irrational thinkers and are a part of cybersecurity systems. Humans must be understood like any other form of technology used in any computer system. We must understand the development of the human mind. In other words, what are the strengths and weaknesses of the human mind? Humans differ from technology in that humans…
Week 6 – Journal Entry 6
Many people fall victim to fake websites by giving out information or money through fraudulent websites. These fake websites look like the real version but are designed to trick you into inputting information to access confidential information or to manipulate you into giving out money. The URL may be similar or look identical to the…
Week 5 – Journal Entry 5
There are many motives of cybercriminals to act maliciously in this world. Depending on the individuals and crimes, the motives can revolve around entertainment, political needs, revenge, being bored, financial reasons, and for many other reasons. At some point in our lives, we get bored. However, a malicious actor is so bored, that the threat…
Week 4 – Journal Entry 4
Maslow’s hierarchy of needs can be thought of as a pyramid of 5 levels. According to Maslow, the needs for humans to survive must be met before higher needs can be satisfied. As you progress higher through Maslow’s hierarchy, the barriers that you must overcome increase in difficulty. Thus, the difficulty of satisfying needs of…
Week 3 – Journal Entry 3
Sites like PrivacyRights.org provide an abundance of information ondata breaches, and researchers can derive new insights from public dataregarding data breaches. Many of the reported data breaches arecategorized by the malicious techniques used, the location of the breach, aswell as the industry type it occurred in. As of 2023, the year of the lastreported breaches,…
Week 2 – Journal Entry 2
Science is a systematic process using organized knowledge in any field to study anyarea of interest. In the case of cybersecurity, threats are everywhere andorganizations, groups, as well as people, must find innovative ways to counter thesethreats. Cybersecurity is considered a multidisciplinary field encompassing manysubjects such as sociology, political science, and psychology, just to name…
Week 1 – Journal Entry 1
The areas of the NICE Workforce Framework that I would want to focus my career onare protection and defense (PD) and possibly, cyberspace intelligence (CI). In theprotection and defense area, I find that identifying, analyzing risks and protectingcomputer systems and networks appealing to me. A work role of this area thatappeals to me is defensive…
Balancing funds between training and cybersecurity technologies
To ascertain materiality in the event of a breach, CISOs must pay closer attention to riskassessments because of stricter requirements, such as the Security Exchange Commission’s2023 cybersecurity disclosure guidelines. To determine a clearer monetary value for risk and toquantify the impact of a breach beyond the High, Medium, and Low categories that manybusinesses utilize, CISOs…