Journal #7 Human-centered Cybersecurity Framework Through Memes

Recognizing expertise regardless of appearance or stature is underscored in this meme. Just because the Pomeranian is small and cute doesn’t mean he isn’t conversant with cyber security. Also, all voices should be heard in human-centered cybersecurity, no matter what they look like at first. The meme is in praise of individuals who have been able to successfully go through cyber threats. His smile depicts triumph over an impending harm. For a human-centered cybersecurity, it requires equipping people with the right information and tools that they can use to identify and respond...

Read More

Journal #6 Fake VS Real Websites

A few key things that distinguish fake websites from real, legitimate sites: Fake: www.paypaI.com  (with an uppercase I instead of L) Uses slightly misspelled or altered domain name www.irs-gov.com Uses hyphens or extra words not found in real domain  www.bankofamerica.co  (with .co instead of .com) Uses alternate top-level domain not used by actual company Real: www.paypal.com Domain matches company exactly www.irs.gov No extra hyphens/words www.bankofamerica.com Uses .com top-level domain The subtle typos, hyphen additions, or domain differences are specifically meant to...

Read More

Journal #5 Cyber Offenses

 After reviewing the motives for cyber offenses presented in Module 5, I have ranked them as follows: 1. Financial Gain 2. Revenge 3. Political Reasons 4. Recognition 5. Entertainment6. Boredom 7. Multiple Reasons Ranking reasons for cyber deviance reveal differences in psychological foundations. The first reason, financial gain, takes precedence due to its undeniable material outcomes, thus establishing it as a highly rational factor. Revenge ranks highly due to the potential for a strong personal motivation to arise from it. Political reason and recognition are in the middle because...

Read More

Article Review #1 Mitigating Ransomware Risks in Manufacturing and the Supply Chain

Mitigating Ransomware Risks in Manufacturing and the Supply Chain Aljoghaiman & Sundram’s (2023) study on the mitigation of ransomware in the manufacturing and supply chain relates to the principle of social science based on the way it gives insight concerning the significance of human factors in cybersecurity. It matches the social concepts that dictate the role of human behaviors, collaboration, the structure of the organization, and the supply chain resilience that determines the cybersecurity results. The study emphasized the need to understand cybersecurity issues in detail as...

Read More

Journal #4 Relating Maslow’s Hierarchy of Needs to Technology

Self-Actualization: In particular, the internet offers infinite supplies of knowledge, imagination, and individual exhibition. YouTube enables me to become effective in hobbies and jobs. Esteem Needs: I receive adequate validation and a feeling of success via likes, shares, and endorsements to satisfy my need for self-esteem and fulfillment through LinkedIn. Belongingness and Love Needs: With relatives and friends scattered across the world, intelligent instant messaging apps and social networks sustain my yearning for the need for social engagements despite the physical distance....

Read More

Journal #3 Cybersecurity breach data from PrivacyRights.org

The cybersecurity breach data from PrivacyRights.org reveals a vast amount of information that the researchers can use in undertaking studies regarding the many facets of such incidents or occurrences. For instance, researchers may analyze the patterns of businesses and sectors that are mostly compromised to determine breach trends and typical weaknesses (Privacy Rights Clearinghouse | Privacy Rights Clearinghouse, 2020). There are many groups, such as government, education, financial/insurance, and healthcare, from which risks can be analyzed in terms of sectors that present the highest...

Read More

Journal #2 How the principles of science relate to cybersecurity

Cybersecurity applies principles of science to protect computer systems and networks from threats. One of the ways through which the principles of science can be used in cybersecurity is through relativism, which states that everything is related. Since there is a connection in the digital landscape, the vulnerability of one part of a system can affect the whole system. The principle of objectivity suggests that emotions should not compromise a person’s judgment. Cybersecurity professionals should, therefore, assess risks and make decisions that are clear of their personal feelings....

Read More

Journal #1 NICE Workforce Framework

The two areas on which I am interested in focusing my career after reviewing the NICE Workforce Framework are exploitation and threat analysis. These two areas will allow me to work in an organization and prevent cybercrime from occurring. I can prevent the hacking of an organization’s security system through exploitation analysis by identifying gaps (NICCS, n.d.). In contrast, threat analysis helps create countermeasures to prevent or mitigate the effects caused by authorized people having access to an organization’s systems. My slightest interest is in all-source analysis since it is...

Read More