Journal Entry 4

Q: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. A: There are five main levels in the Maslow’s Hierarchy of needs: 1. Physiological needs ( food, water, warmth). 2. Security needs (safety).  3….

Journal Entry 3

Question: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Answer: The website PrivacyRights.org can offer numerous insights about privacy and cyber laws in each state. Also it provides accurate and numerous statistics on cyber breaches…

Week 2 – Journal Entry

There are a few main principles of science that relate to cybersecurity. These include:  Each of these sciences play a role in studying cybersecurity, and could provide a better understanding on why groups or individuals commit cyber crimes. However, it is still unclear why cyber crimes occur. 

Journal 1

The NICE ( National Initiative for Cybersecurity Education) Workforce Framework provides a foundation for the increasing size of the workforce in cybersecurity. It also gives a list of cybersecurity tasks, roles, and the knowledge, and skills for those roles. There are three areas that I will like to focus on for my career in cybersecurity:…

The NIST Cybersecurity Frame Work

As the increase use critical infrastructures continues to rise, so does cyber attacks. With technology continuing to advance, cyber attacks are becoming more sophisticated, and complex. In response, the Cybersecurity Enhancement Act of 2014 updated the need to design a cybersecurity framework, to develop the strength of cybersecurity. In summary a cybersecurity framework serves a…

Going on job hunt

Out of the 50 jobs listed within the article, these two stood out. These two are ethical hacking, and cybersecurity hardware engineer. In definition, ethical hacking is attempting to access computer systems, application or data with authorized permission. The main goal of an ethical hacker is to attack a system, and report any found vulnerabilities…

CIA Triad

Cyber-attacks are becoming more frequent and complex. Organizations want solutions on how to protect the secrecy of data, consistency of data, and availability of data. This is where the CIA Triad comes into play. CIA stands for confidentiality, integrity and availability. The CIA Triad acts like a model, and guides an organization to design policies…