Article Review #1

Ja’Qwah Lewis  Dr. Leigh Armistead  CYSE 201s  11 February 2023  Understanding of How Fraud Works   When understanding how fraud works it can be quite difficult. The reason for that is many aspects control fraud. For example, who is more likely to follow the scam? When you break fraud down, you have to break it…

Journal #8

1.  How can you tell if your computer is safe? While having a computer is fun and very useful a person alway has to do it safely. It can be pretty tricky to tell if your computer is safe or not but there are plenty of ways to check. Even if you’re not an IT…

Journal #7

1. What are the costs and benefits of developing cybersecurity programs in business?  When looking at the benefits of cybersecurity it’s pretty obvious that it’s needed in a business. But sometimes people who own the business or that’s part of the business forget to look at the cost of cybersecurity. Now when determining the cost…

Journal #8

When viewing how the media influences cybersecurity, it could be very tricky. To start off with, someone could simply watch a movie that involves breaking some kind of code on a computer. Now when watching that happen we would have to pay attention to how they were doing it to see if they were doing…

Journal #6

When reviewing the fake websites I found it could be quite difficult to tell if they are real or not. The reason for that is because most of the time when you google searching to order items most people don’t go too far into detail if the website looks normal. Which could explain why people…

Journal #5

So when ranking the articles and its motive this is what I get:  How I ranked these articles and its motives was from 1 being the one that makes the most sense to me. And 7 being the one that makes the least amount of sense to me. When judging the articles it judged it…

Journal #6

To start off deviance means “the fact or state of departing from usual or accepted standards, especially in social or sexual behavior” (“Oxford Languages and Google – English | Oxford Languages”). So when viewing how workplace deviance can happen in the cyberfield it can happen easily because it doesn’t have to be face to face….

Journal #5

Create app that relates software. Yacht GPS software that is secure. Becoming a ethical hacker. E-commerce security. Rating company security systems and telling them how to improve them. Setting up your own cyber security company. Entry level cyber security technologist. Chief Information Security Officer (CISO). Uniting companies to report cyber criminals to help improve security…

Journal #4

When reviewing Maslow’s Hierarchy of Needs can relate to technology in multiple ways. To start off with the bottom of the pyramid which is physiological needs. From personal experience, physiological needs could be related to technology by having the feeling of anger or anxiety when I lost my phone.  The next step up the Maslow’s…