There are many motives an individual may have for committing cybercrime, including entertainment, political, revenge, boredom, recognition, monetary, or a combination of reasons. Below is a ranking of these motives, in the order that I find them to make sense, with the first making the most sense.
Author: bwill122
Journal Entry: Technology at Each Level of Maslow’s Hierarchy of Needs
Maslow’s Hierarchy of Needs consists of five levels: physiological, safety, belongingness and love, esteem, and self-actualization. Starting at the physiological level, technology helps you rest more effectively. Tools like bedtime calculators help determine when to sleep and wake to feel well-rested. At the safety level, technology provides a sense of security, enabling you to quickly…
Journal Entry: Researching Data Breaches Using PrivacyRights.org
Researchers may use the information on PrivacyRights.org to analyze different security breaches and to understand how breaches are distributed around the United States. On the website, the Data Breach Chronology includes information about the number and type of breaches that have impacted each industry, the geographic location of breaches, and detailed information about each breach…
Journal Entry: The Relation of Scientific Principles to Cybersecurity
The principles of science relate to cybersecurity because in order to further advance the cybersecurity field, researchers must conduct social science research. While these research studies are not conducted in labs like typical scientific studies, they still use the same principles, including research questions, hypotheses, and variables. Research questions allow cybersecurity researchers to establish what…
Journal Entry: NICE Workforce Framework
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. I would like to focus my career on the Cyberspace Intelligence, Oversight and Governance, and Investigation areas of the NICE Workforce Framework….
Budgeting Cybersecurity Training & New Cybersecurity Technologies
This article explains the importance of cybersecurity training and upgrading cybersecurity technology. An explanation of how cybersecurity training and upgrading cybersecurity technology should be balanced in an information security budget is also provided. Importance of Cybersecurity Training Ensuring that employees receive up-to-date cybersecurity training is one of the most important things a company can do…
Mitigating Vulnerabilities with SCADA Systems
This article explains vulnerabilities found in critical infrastructure systems. The role that SCADA – Supervisory Control and Data Acquisition applications play in vulnerability mitigation is also discussed. Critical Infrastructure Vulnerabilities Vulnerabilities in critical infrastructure include resource disparity, outsourcing complexity, natural disasters, human actions, and accidental or technical failures (Tal, 2018). Resource disparity is defined as…
Understanding the CIA Triad
This article contains a short description of each part of the CIA Triad – Confidentiality, Integrity, and Availability. The concepts of authentication and authorization are also described, and examples of both terms are provided. CIA Triad Overview The CIA Triad stands for Confidentiality, Integrity, and Availability, which are “the pillars of information security” (Cawthra et…