Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. Entertainment –https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ Political –https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms Revenge https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/ Boredom https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/ Recognition https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/ For money Sex, Drugs…
Author: bzaka001
Journal Entry 4
Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. The first base of Maslow’s Hierarchy of Needs is the sociological needs, where common examples are food, shelter, and rest. For me, I have to be in…
Journal #3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Researches could use this information to see what types of data breaches are the most common across the country, and therefore figure out which types of breaches…
Journal #2
Explain how the principles of science relate to cybersecurity There are seven principles of science, and each on of them relates to cybersecurity in their own way. The seven principles are Relativism, Objectivity, Parsimony, Empiricism, Skepticism, Ethical Neutrality, and Determinism. Relativism is the understanding that everything has a relationship, even if it is not easy…
Journal Entry #1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The areas that would I would be more interested in are Analysis, Investigation, Protect and Defend, and Securely Provision. The areas I…
The Inevitable
Just like what was discussed in the Jonas Reading, it is impossible to prepare entirely for the future. Technology as a whole is only going to become more powerful, and therefore more adaptable and unpredictable, the longer it is used in general society. Cyber infrastructure must be maintained by having the most up-to-date computer systems…
The Benefits of the NIST Cybersecurity Framework
The benefits that an organization can gain from the NIST Cybersecurity Framework can either be expansive, or minimal, depending on the state that the organization was in before the introduction of this Framework. This is actually illustrated in the framework itself, as it prompts the organization to rank themselves within the frameworks ranking system, to…
The Human Factor in Cybersecurity
Name: Brandon Zakaras The important question when discussing the human factor in cybersecurity is how much money to invest in human resources, and how much money to invest in technological resources. Cybersecurity is a very complex issue that cannot be solved by just one or the other, but rather a combination of both. With a…
CIA Triad
CIA Triad and Authentication Versus Authorization Brandon Zakaras Synopsis If a person who has never delved into the world of cybersecurity were to try and plan for all the different vulnerabilities that afflict organizations in today’s world, they would be massively overwhelmed. The CIA Triad helps give both…