Journal 7

Human systems integration focuses on the making technology easier and simpler for humans to use in order to prevent error and increase productivity. The meme I created shows that with many advances in technology, we are now able to complete tasks from just about anywhere. We are no longer required to be tethered to a…

Journal 6

There are many types of fake websites, and they can be disguised in multiple ways. Three examples of fake website are: bankoffamerica.com, waImart.com, and netflix.net. The first is a fake website because they’ve included the intentional misspelling of the word “of” and using “off” instead. It’s something that is so simple to overlook and that…

Journal 5

There are many individual motives that leads a person to commit crimes. Seven of the most common are: entertainment, political, revenge, boredom, recognition, for money, and multiple reasons. If I had to rank these motives from 1-7 in to order that makes the most sense for committing crimes with 1 being the one that makes…

Journal 4

Maslow’s Hierarchy of Needs is composed of three main categories: Basic needs, psychological needs, and self-fulfillment needs. The basic needs category includes both physiological and safety needs. The psychological needs category includes belongingness and love needs, as well as esteem needs. The last category of self-fulfillment encompasses all aspects of self-actualization. I have personally used…

Journal 3

In order to study breaches, researchers can use information found on privacyrights.org. This website provides an abundance of information on the types of security breaches on all types of organizations. They have the ability to filter by specific dates to see the trends of security breaches and try to determine an increase or decrease of…

Journal 2

Cyber security can be related to all principles of science. Although it may not be obvious at first, the principles of science play a large role in cyber security. One of the scientific principles, relativism, is very important in the field of cyber security. Relativism helps us understand that all things are related in some…

Journal 1

There are many areas that I would like to focus my career on in the field of cyber security. I would especially like to specialize in an analytical job role such as language analysis or threat analysis. I know that I would excel in these roles because I am very detail oriented and pick up…

Technology and Society

Cyber Technologies Cyber technologies have become increasingly commonplace in today’s world and are so much a part of our everyday lives. Our society has changed and adapted to use and almost be dependent on certain technologies. We must now adapt to this new norm and try to stay ahead of any potential risks associated with…

The Human Factor in Cybersecurity

The CISO, or Chief Information Security Officer, is responsible for monitoring, maintaining, and protecting the information systems of the organization that they work for. They are also responsible for creating and implementing budgets for training employees and maintaining the systems software and hardware in order to remain secure against any current or future threats. As…

SCADA – Supervisory control and data acquisition

SCADA Systems SCADA is Supervisory Control and Data Acquisition and is responsible for monitoring, controlling, and analyzing data in real-time. It deals with all types of infrastructure systems, such as: water treatment, waste management, pipelines, wind farms, and much more. SCADA monitors communicate through the use of HMIs, or Human Machine Interfaces. This allows for…