Week 8 – Journal Entry

The media portrays cybersecurity as a world of only randomized numbers, which are keys and combinations that hackers use to access anything from anywhere. Like the movies, the media portrays cybersecurity as unrealistic and has to be top-secret government files. At the same time, it can be as simple as breaching your wifi or connecting…

Week 7 – Journal Entry

This relates as it shows ignorance of wifi within society This relates as it shows Ignorance of older generations not knowing the new scams to be alert for This relates as it shows bliss of a man thinking he has done good while in reality he’s been scammed This shows a man in a disclosed…

Week 6 – Journal Entry

Ralphlaurenbogota.com and Ralph Lauren Fake Ralph Lauren Polo site, which claims to be the actual website and uses offers people can’t refuse due to how low it makes them seem. The website’s look and feel are almost 1 to 1 since it’s copying and stealing images. They lure people in based on social media platforms….

Week 4 – Journal Entry

Maslow’s Hierarchy of Needs is made of Self-management needs (Self-actualization), Physiological needs (Esteem needs, Belongingness, and love needs), and Basic needs (Safety needs and Physiological needs). Self-actualization is getting growth needs as well as an increase in motivation, which relates to cybersecurity as you must stay motivated to keep up with the continuously changing software…

Week 3 – Journal entry

Paper records, passports and grants, medical information, biometric personal information, and encrypted and deidentified information are all considered Personally identifiable information, which in most states allows you to access one’s finances and identity. The information shows that most breaches come from hackers and an unidentified source. Researchers should use this information to study the code…

Week 2- Journal entry

The foundation of science is what the laws of cybersecurity abide by. Cybersecurity experts watch network activity which relates to observation and analysis, looking for problems to stop any attacks such as any other scientist. Hypothesis testing is used to model and strengthen cybersecurity mechanisms against ever changing vulnerabilities, very similar to the scientific method….

Week 1 – Journal Entry

I would want to focus my career on these areas and master them. System Analysis: I am the bridge between businesses and information technology as I study their computer systems, design information systems, and everything involved in the organization’s mainframe. Cyber Operations- this appeals to me because I would be allowed to handle foreign intelligence fighting…

SCADA Systems

SCADA stands for Supervisory Control And Data Acquisition. The SCADA System is the primary system component that controls everything, serving as host and connected to the HMI, which “provides the diagnostic data, management information, and trending information.” Because of HMI’s position in SCADA systems and capabilities, it’s considered an ideal threat to control and misuse….

Going on a Job Hunt

The disciplines represented in these 50 jobs are: Two jobs pique my interest: Chief Information Security Officer (CISO) and Chief Security Officer (CSO). To be a Chief Information Security Officer (CISO) and Chief Security Officer (CSO), you need to have a bachelor’s degree at the bare minimum, even though it is highly recommended to receive…