Women in Cybersecurity In the United States of America, there are currently 769,736 cybersecurity job openings (Cybersecurity supply and demand heat map). Both companies and the government are looking for people to fill these positions. It seems that the more… Continue Reading →
The two areas that appeal the most to me would be oversee and govern and protect and defend. I think that both of these have career options that I would be interested in pursuing. Cyber defense analysis, which is part… Continue Reading →
For the money- I think that this makes the most sense for committing crimes because money rules everything around us. You can buy clothes, shoes, houses, cars, pay your bills and do all types of other stuff with money. Money… Continue Reading →
On the bottom of Maslow’s Hierarchy of Needs is physiological needs. I don’t have very many examples of technology in my life being a physiological need, but every once in a while in order to go to sleep I will… Continue Reading →
According to PrivacyRights.org there are 8 types of breaches. Those breaches include card, hack, insider, physical, portable device, stationary computer loss, unintended disclosure , and unknown. A researcher might use the information that we have on these eight breaches to… Continue Reading →
In the article “Do You Love Me? Psychological Characteristics of Romance Scam Victims”, the author, Monica Whitty, discusses the most well known type of mass-marketing fraud which is romance scams. Romance scams are different from your typical scams because the… Continue Reading →
Cyber technology has changed the way that offenders and victims interact. Now it is a lot easier to become a victim of cybercrime and a lot harder to know who is committing the crime. Some older people are more likely… Continue Reading →
One way computers have made the world safer is by getting us information quicker than ever before. One example of this is when knowing when and where a crime has been or is being committed at. On campus if there… Continue Reading →
There are many cost and benefits that come with developing cybersecurity programs in business. Everything in this world comes wit a price and the protection of your digital information is no different. Developing a good and secure cybersecurity programs is… Continue Reading →
While technology is extremely helpful for businesses, individuals, and organizations people still have to be involved with these machines and networks. Any time a human is involved there is room for human mistake and human emotions. One emotion that can… Continue Reading →
© 2025 Briah Croom — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑