Brittney DavisCYSE 201SProfessor Trinity WoodburyApril 26, 2025 Career Paper Penetration Tester A Penetration Tester, or “ethical hackers,” as they are more commonly known, is an ITprofessional who a company or organization hires to assess the security of its computer systemsand networks by simulating cyberattacks. In cybersecurity, penetration testers are pivotal becausethey can find vulnerabilities in…
Journal Entry # 10
Read this and write a journal entry summarizing your response to thearticle on social cybersecurity The article “Social Cybersecurity: An Emerging National Security Requirement” explores the significance of social cybersecurity and its effects on national security. It also defines social cybersecurity as a multidisciplinary field that studies how cyber-mediated interactions can influence human behavior, social…
The Human Factor In Cybersecurity
The Human Factor in Cybersecurity During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats. Now, put on your Chief Information Security Officer hat. Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?…
The CIA Triad
CIA Triad and Authentication vs Authorization The CIA Triad, or AIC Triad, is a cybersecurity blueprint consisting of three key concepts. These are the key principles used to ensure the security and reliability of information systems. The CIA Triad is crucial in securing data, but authentication and authorization verify a user’s identity and determine the…
SCADA System
SCADA SYSTEMS Supervisory Control and Data Acquisition, or SCADA for short, refers to Industrial Control systems (ICS) that control infrastructure, facility-based, and industrial processes (Google Doc, SCADA Systems, 2020). Critical infrastructure is our country’s vital system; Scada comes into place because it monitors and controls processes within these infrastructures. While these processes and systems are…
Journal Entry # 9 Social Media Disorder Scale
Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pintrist, forums, weblogs) in past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine) criteria must be met for a…
Journal # 8: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
After watching the video Hacker Rates 12 Hacking Scenes In Movies And TV with Keren Elazari, I found that the media makes cybersecurity seem somewhat intimidating and fast-paced but also exciting. In the movie and TV scenes presented in the video, we are shown various elements of hacking, which are either confirmed or quickly debunked…
Journal Entry # 6
How can you spot fake websites? Compare three fake websites (don’t access those sites, of course) to three real websites. What makes the counterfeit websites fake? Examples of Possible Fake websites: • TiffanyCoShop.com• Sheingivesback.com• Zorasoul.co Examples of Legitimate websites:• www.tiffany.com• www.shein.com• www.temu.com Some ways to detect a fake website:• Carefully check the URL for misspellings•…
Journal Entry #5
Motives Ranking Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 1. Political—Political motives make the most sense when it comes to cybercrimes because most people are passionate…
Journal Entry # 4 Maslow’s Hierarchy of Needs and how each level relates to your experiences with technology
Regarding Maslow’s Hierarchy of Needs, he states that all humans have needs in a hierarchy and that as our lowest needs are met, we focus on our upper-level needs. While this is true, he also believes that our behaviors determine our needs, and as time passes, our needs will begin to change. The needs in…