Journal #5

Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. Entertainment –https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ Political...

Read More

Journal Entry 4

Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. The first base of Maslow’s Hierarchy of Needs is the sociological needs, where common examples are food, shelter, and rest. For me, I have to be in contact with people through my device, such as my family, in order to ensure that they know I am okay....

Read More

Journal #3

Visit PrivacyRights.org to see the types of publicly available information about data breaches.  How might researchers use this information to study breaches?  Enter a paragraph in your journal. Researches could use this information to see what types of data breaches are the most common across the country, and therefore figure out which types of breaches need to be the most protected against. There is also a list of known data...

Read More

Journal #2

Explain how the principles of science relate to cybersecurity There are seven principles of science, and each on of them relates to cybersecurity in their own way. The seven principles are Relativism, Objectivity, Parsimony, Empiricism, Skepticism, Ethical Neutrality, and Determinism. Relativism is the understanding that everything has a relationship, even if it is not easy to see at first. This can be applied to Cybersecurity in the way that...

Read More

Journal Entry #1

Review the NICE Workforce Framework.  Are there certain areas that you would want to focus your career on?  Explain which areas would appeal the most to you and which would appeal the least. The areas that would I would be more interested in are Analysis, Investigation, Protect and Defend, and Securely Provision. The areas I am less interested in are Collect and Operate, Operate and Maintain, and Oversee and Govern. Out of Analysis,...

Read More

The Inevitable

Just like what was discussed in the Jonas Reading, it is impossible to prepare entirely for the future. Technology as a whole is only going to become more powerful, and therefore more adaptable and unpredictable, the longer it is used in general society. Cyber infrastructure must be maintained by having the most up-to-date computer systems as possible, but by also having the most up-to-date personnel as possible. In a world of technology, it is...

Read More

The Benefits of the NIST Cybersecurity Framework

The benefits that an organization can gain from the NIST Cybersecurity Framework can either be expansive, or minimal, depending on the state that the organization was in before the introduction of this Framework. This is actually illustrated in the framework itself, as it prompts the organization to rank themselves within the frameworks ranking system, to deduct where the company currently is, and where it wants to be in the future in terms of...

Read More

The Human Factor in Cybersecurity

Name: Brandon Zakaras The important question when discussing the human factor in cybersecurity is how much money to invest in human resources, and how much money to invest in technological resources. Cybersecurity is a very complex issue that cannot be solved by just one or the other, but rather a combination of both. With a limited budget in mind, I would attempt to focus most of my finances on paying for technological solutions, but I would...

Read More

CIA Triad

CIA Triad and Authentication Versus Authorization Brandon Zakaras             Synopsis             If a person who has never delved into the world of cybersecurity were to try and plan for all the different vulnerabilities that afflict organizations in today’s world, they would be massively overwhelmed. The CIA Triad helps give both users who have had years of...

Read More