Journal Entry 8

The portrayal by the media concerning cybersecurity goes a long way in shaping the perception of people; this makes the lines between what is real and what is not very blurred. While others try to stick to the truth, some are modified to add dramatization. This perpetuates misconceptions concerning the actual rate at which hacking…

Journal Entry 7

“When you’re so focused on your work, you forget about phishing emails” This meme illustrates how intense concentration can lead to overlooking cybersecurity threats, emphasizing the need for constant vigilance. “Work device: Fort Knox. Personal phone: Welcome hackers!” This meme addresses the potential security gap between work and personal devices, emphasizing the need for consistent…

Hacking Humans

DNA testing services have become increasingly popular due to human curiosity and advancements in digital technology. While the services can actually help in medical research, they also introduce severe security and privacy concerns. Digitized DNA opens up a whole new frontier called “cyberbiosecurity” that looks at the risks from digitizing life sciences data. DNA is…

Journal Entry 6

Key differences while comparing fake and real sites. The three common fake websites make use of popular platforms such as facebook.com, amazon.com, and paypal.com. These fake sites generally have minor discrepancies in the URL such as faceb00k.com, arnazon.com, and pàypal.com. They may lack security in HTTPS, poor quality design, or a large number of spelling…

Article Review 1

Chaitanyakumar Patel October 2, 2024 Article Review #1 Cybersecurity Through a Social Science Lens – Applying Scientific Principles to Digital Workplace Performance Introduction This review examines one such study, by the International Journal of Cyber Criminology, in which an attempt has been made to apply the principles of social sciences to understand how cybersecurity influences…

Journal Entry 5

Here is my ranking of the individual motives for cybercrime from most sensible (1) to least sensible (7), along with explanations for each: Financial gain is the most logical and understandable motive for cybercrime. Many cybercriminals are motivated by the potential to make significant profits through activities like ransomware, fraud, and theft of financial data….

Journal Entry 4

Physiological: Technology helps fulfill basic physiological needs by enabling access to food, water, and shelter. For example, ensuring our smartphones are charged and have a data connection. And food delivery apps and online grocery ordering for easy access to food. Plus,smart home devices to control temperature, lighting, etc. for comfort. Safety needs: Technology provides tools…

Journal Entry 3

Researchers may use the PrivacyRights.org Data Breach Chronology for extensive studies of data breaches within the United States. This database allows the filtering of entries according to year, company, organization type, and breach type in order to analyze trends and patterns in data breaches over time. They can view how often certain types of breaches,…

Journal Entry 2

The principles of science are closely related to cybersecurity through several key concepts. Relativism recognizes the interconnectedness of systems, highlighting how changes in one area affect cybersecurity. Objectivity ensures unbiased research, crucial when studying sensitive topics like cybercrime punishment or digital terrorism. Parsimony strives for simple explanations in complex scenarios, such as applying self-control theory…

Journal Entry 1

The NICE Workforce Framework for Cybersecurity presents a range of career options that pique my interest. However, there are a few areas that particularly stand out to me. My top choice would be the Protection and Defense category, as I’m drawn to roles that involve actively safeguarding systems and networks against threats. The aspect of…