Week 8 – Journal Entry

            While I do enjoy the way movies portray hacking, both in a good and negative light, generally it is unrealistic in its depiction of hacking. Frequently hacking is portrayed as something flashy and cool, with lots of screens and moving numbers and similar things, when in reality hacking could be as simple as you…

Week 6 – Journal Entry

            So using these two sites, https://www.aura.com/learn/how-to-identify-fake-websites and, I found three good examples of fake websites. In all three examples, the URL’s for the sites do not match the URL’s of the official sites. In the case of the Nike Factory Store example, the URL doesn’t even look similar. In the case of the Apple…

Week 5 – Journal Entry

            So based on the seven individual motives listed: Entertainment, Political, Revenge, Boredom, Recognition, For Money, and for Multiple Reasons; I think that for Multiple Reasons would be the one that makes the most sense, as there is usually multiple underlying reasons for why someone commits crime, it’s not generally just a simple single reason….

Week 4 – Journal Entry

            Maslow’s Hierarchy of Needs has five levels: Physiological Needs, Safety Needs, Belonging Needs, Esteem Needs, and Self-actualization. At this point and time, I would say access to the internet is a physiological need. So much of what I am required to do in life needs the internet, even in cases where I wish it…

Week 3 – Journal Entry

            PrivacyRights.org is a site dedicated to showing every data breach that has happened in the United States, or at least the ones that are publically reported. Researchers might use this information to study how the breaches take place. For each breach, the site gives information such as: The Sum of Records Impacted, The type…

Week 2 – Journal Entry

            So how do the “principles of science” relate to cybersecurity. All seven of the principles of science (Relativism, Determinism, Ethical Neutrality, Empiricism, Skepticism, Parsimony, and Objectivity) can be related to cybersecurity in at least some manner.             With Relativism, you can connect other fields evolving as having an effect on cybersecurity and will continue…

Week 1 – Journal Entry

After Reviewing the NICE Workforce Framework, I would want to focus my career on the Cyberspace Effects area. Exploitation Analysis stood out to me as a potential route to go down for a career. The idea of being a White-Hat hacker appeals to that childhood desire to be a hero in a way. Cyberspace Operations…

The Human Factor in Cybersecurity

In this paper I will talk about balancing the tradeoff of training and additional cybersecurity technology with a limited budget. Introduction With a limited budget, regardless of the amount, you have to balance it between the things you need to cover, in this case training and additional cybersecurity technology. You cannot focus one or the…

The CIA Triad and Authentication &Authorization

In this paper I will break down the acronym of the CIA Triad and discuss the terms anddifferences of Authentication and Authorization. Further I will explain the importance of theseterms and their applicability to cybersecurity. The CIA Triad The CIA Triad is a basic tenet of Cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These easily…