The areas that I wanted to focus my career on were Artificial Intelligence (AI) Security, Cloud Security, and Operating Systems (OS) Security. I chose these three areas because they are swiftly developing, highly impactful, and central points to the modern digital infrastructure. They all share a common purpose of securing both digital environments and technologies that support information technology, which requires technical capability, a dynamic approach to evolving threats, and mutual dependence on the principles of core security. In other words, these three areas are highly valuable because AI security is crucial for the future, Cloud Security is necessary for securing the core of the modern IT infrastructure, and OS Security provides both basic knowledge and broad suitability.
The principle of empiricism enhances the effectiveness of cybersecurity practices because it bases cybersecurity in the real-world, which makes security measures more responsive, effective, and resilient. For instance, when cybersecurity professionals both analyze and collect empirical data, they can anticipate early emerging threats, validate the current defenses based on actual performance, and innovate the security strategies informed by the real-world evidence rather than theories. In other words, since this scientific approach emphasizes knowledge that is gained through observation, experience, and data to enhance cybersecurity practices, it makes it highly necessary for a greatly evolving digital threat environment where unchanged theoretical methods fail.
Researchers use the information about privacy rights to better understand the causes and patterns of data breaches by inspecting what specific rights, such as the right to data reduction or data access are most often violated. This helps to highlight the areas of vulnerability. Researchers use this technique to build anticipating models, factoring in oversight effectiveness, industry practices, and user behavior to speculate both where and how future breaches might occur. It also helps to explain how well individuals both know and exercise their privacy rights offer insight about how user behavior leave an impact toward data security. In other words, researchers can analyze both past incidents and early warning signs for emerging threats.
In Maslow’s Hierarchy of Needs, each level relates to my experiences with technology. For instance, the level of psychological needs is the basic life in sustaining needs like food, water, and shelter. This relates to my experience with technology because I use food delivery services like DoorDash and Grubhub for easier accessibility for food, and a fitness tracker to help monitor my exercise and hydration routines. The level of safety needs refers to the protection of harm, and both personal and financial security. This relates to my experience with technology because I use two-factor authentication for my accounts for a safer digital experience to prevent interactions with any data breaches. The level of belongingness and love needs contributes to friendships, relationships, intimacy, and a sense of connection. This relates to my experience with technology because I use apps like Instagram and FaceTime to chat with friends and family to keep me emotionally connected. The level of esteem needs contributes to respect, self-esteem, achievement, and recognition. This relates to my experience with technology because I posted a YouTube video, and received several comments that were highly complimenting, which gave me a good sense of achievement. Finally, the level of self-actualization refers to achieving one’s full potential, creativity, and personal growth. This relates to my experience with technology because when I first learned how to make a video game back in middle school, it encouraged me to pursue that activity and choose to major in Game Design in college today.
My ranking for the motives that make the most sense to the least sense are for money (1), multiple reasons (2), political (3), recognition (4), curiosity (5), entertainment (6), boredom (7), and revenge (8). Money is first because it is the most common factor in human society and people need it for comfort, survival, power, and opportunity. Multiple reasons is second because human behavior is defined by multiple reasons, such as either money and recognition, or curiosity or boredom. Political is third because political motives are based on people’s beliefs about society, justice, freedom, and identity. Recognition is fourth because it explains everything from social media behavior to performance, competition, or the criminal acts that draw attention. Curiosity is fifth because it drives learning, exploration, invention, and sometimes trouble. Entertainment is sixth because people tend to act out based on their desire to amuse themselves, such as trolling, creating prank videos, and doing risky stunts. Boredom is seventh because it explains behavior, but lacks more of a purpose than a clear reason. Finally, revenge is eighth because it causes more harm than good, which makes less logical sense.