Journal Entry 5

Here is my ranking of the individual motives for cybercrime from most sensible (1) to least sensible (7), along with explanations for each: Financial gain is the most logical and understandable motive for cybercrime. Many cybercriminals are motivated by the potential to make significant profits through activities like ransomware, fraud, and theft of financial data….

Journal Entry 4

Physiological: Technology helps fulfill basic physiological needs by enabling access to food, water, and shelter. For example, ensuring our smartphones are charged and have a data connection. And food delivery apps and online grocery ordering for easy access to food. Plus,smart home devices to control temperature, lighting, etc. for comfort. Safety needs: Technology provides tools…

Journal Entry 3

Researchers may use the PrivacyRights.org Data Breach Chronology for extensive studies of data breaches within the United States. This database allows the filtering of entries according to year, company, organization type, and breach type in order to analyze trends and patterns in data breaches over time. They can view how often certain types of breaches,…

Journal Entry 2

The principles of science are closely related to cybersecurity through several key concepts. Relativism recognizes the interconnectedness of systems, highlighting how changes in one area affect cybersecurity. Objectivity ensures unbiased research, crucial when studying sensitive topics like cybercrime punishment or digital terrorism. Parsimony strives for simple explanations in complex scenarios, such as applying self-control theory…

Journal Entry 1

The NICE Workforce Framework for Cybersecurity presents a range of career options that pique my interest. However, there are a few areas that particularly stand out to me. My top choice would be the Protection and Defense category, as I’m drawn to roles that involve actively safeguarding systems and networks against threats. The aspect of…