Journal Entry 11

This presentation shows that service security and jobs have many requirements for work in this job. Social behaviors, analyst job as people who have a clean record when it comes to working this job. When it comes to going for a service security analyst job, they made me look for attributes that make you stand…

Journal Entry 10

The article is based off cyber security and was explaining how human behavior in national security can affect the glow when using cyber security in separate ways. They explain that human behavior can be a threat when it comes to using cyber security and that in the future, when it comes to high levels of…

Journal Entry 6

One of the fake websites I find very interesting is the Website called AmazonStorePro.com, and what makes this different from the real Amazon website is the type of deals they give out for high priced items. The website has big discounts and deals that are unrealistic for that website with buy 2 get 3 free….

Journal Entry 2

Some Scientists have tried to prove to people the theories behind whythe principles of science play a role in Cyber Security. One of theexamples is determinism, which concludes the behavior of the personhacking into systems, which may be an influence by groups. WithDeterminism, the person’s action may also result in what a personwants to gain…

journal entry 5

The reason why I picked Multiple reasons for number one is because, we really don’t always know exactly why people hacks system and the purpose of getting in them. For the second one I put for money because, some of the people in this world use a lot of different hacks to get into any…

Journal Entry 3

Journal Entry #3 With using Data Breach, researchers would use this website to help get a better understanding of what type of way the hackers would try to hack. While looking at the chart on the website it shows the different types of ways hackers would try to hack systems. One of the biggest ways…

Journal Entries

Bobby Sutton Jr. 9/18/2024 CYSE201s Journal Entry #3 With using Data Breach, researchers would use this website to help get a better understanding of what type of way the hackers would try to hack. While looking at the chart on the website it shows the different types of ways hackers would try to hack systems….