CYSE 201S

Hunter Morgan – Journal Entry 15 I think that Davin Teo’s pathway to the field of digital forensics is really quite inspiring. The fact that he was an accountant and just happened to stumble into the field is quite crazy. Especially crazy since he was at one of the big four accounting firms in the…

CYSE 201S

Article Review #1 – Bugs in our PocketsHow the topic relates to the principles of the social sciencesThe topic of this article relates to the principles of the social sciences because it focuseson keeping the government in check, and protecting ourselves from unethical behavior from lawenforcement or government agencies.The study’s research questions or hypothesesThis study…

CYSE 201S

Hunter Morgan 3-24-24 Article Review #2 – AI versus Criminals       certain groups Question 1 – This topic relates to the principles of the social sciences because it is talking about how AI can be used to prevent criminals from commiting crimes. It goes into depth about how it can learn what type  of actions or…

CYSE 201S

Career Paper – Hunter Morgan Hunter Morgan April 7th, 2024 CYSE 201S Professor Bora Aslan Social Science Within Ethical Hacking I want to be an ethical hacker. The thrill of sneaking into a company’s database, even ethically, makes me have a passion for hacking. This job can also be known as a “pentester” and it…

CYSE 201S

Journal Entry 14 – Hunter Morgan The five most serious offenses listed in the article, in my opinion, are sharing passwords, addresses, or photos of others, bullying and trolling, recording a VoIP call without consent, collecting information about people under 13, and illegal searches on the internet. The main thing that all of these offenses…

CYSE 201S

Hunter Morgan – Journal Entry 12 Two economic theories that relate to this letter are the rational choice theory and the Laissez-Fare theory. These relate because the government might need to intervene in this particular case in the incident that anyone ends up a victim of identity fraud, and also the business made a choice…

CYSE 201S

Hunter Morgan – Journal Entry 13 The finding this article presents that I would most like to discuss was the fact that hackers are practically without a set value. More so even, a capped value, as the study shows they are hired at the same rate no matter what the price is. This is very…

CYSE 201S

Hunter Morgan – Journal Entry 10 The effect of social cyber activity can be detrimental to any military around the world. The amount of information that every government agency and military has online is actually quite alarming, considering the horrific events that would happen if some information was to be leaked. Nuclear codes have been…

Hunter Morgan

CYSE 201S – Journal Entry 11 As a cybersecurity analyst, it seems like you have to be extremely well at talking to others, however, not necessarily highly social. You will be required to talk to people over the phone, but the job can be done mainly by yourself, and sometimes even at your own home….

CYSE 201S

Hunter Morgan – Week 10 According to the Social Media Disorder Scale, I am doing perfectly well. I answered no to every question on the scale, meaning I have no issues from a social media point of view. However, I have never been to keen to be on social media, and do not even have…

CYSE 201S

Hunter Morgan – Journal Entry Week 8 The mainstream media seems to depict the hacking process as simply a lot faster than it really is. The main thing that movies wrongly express is just how quickly they got into these secure systems. A hacker is going to spend days, weeks, or even months hacking something….

CYSE 201S

Hunter Morgan – Journal I made this meme because it has a sarcastic element to it. Humans are merging with technology at a rapid pace, and in a hundred years, the world is absolutely going to look extremely different than now. Us humans put all of our ideas and research online now, making it accessible…

CYSE 201S

Hunter Morgan Journal Entry – Week 6 Fake websites are absolutely everywhere online. Almost everyone could go to their email right now and find a fake link that was sent to them. However, sometimes it is very difficult to actually tell any difference between the two. I am currently studying for my Security+ 601 Certification,…

CYSE 201S

Hunter Morgan – Journal Entry 5

CYSE 201S

Hunter Morgan – Journal Entry – Week 4 Maslow’s Hierarchy of Needs is a commonly used way of examining needs in specific fields, such as the medical field. When looking at the technology world, regarding my own experiences as well, it can also be applied fairly easily. The needs are Self-actualization, Esteem, Love/Belonging, Safety, and…

CYSE 201S

Journal Entry – Week Three PrivacyRights.org is an excellent source of information available for those in the cyber industry, specifically regarding data breaches. It presents areas within the world of business that are frequently targeted, as well as areas that seem to be easier for people to attack. Using this information, cybersecurity professionals can better…

Journal Entry-2

CYSE 201S The principles of science relate to cybersecurity in many unique ways. The different principles of science include determinism, relativism, objectivity, parsimony, ethical neutrality, objectivity, and skepticism. The main ones I think relate to the cyber field are relativism, ethical neutrality, and objectivity. I think relativism is extremely related to cybersecurity and will be…

CYSE 201S

Journal Entry 1 After reviewing the NICE Workforce Framework, I think the major areas I would like to focus my career on would be using existing task, knowledge, and skill (TKS) statements. These seem like a fun place to be, since it would constantly be moving and changing. Every day you could update and improve…

Journal 1

Prompt – Why are you interested in cybersecurity technology? I am interested in cybersecurity technology because I believe that the cyber industry has major job growth in its future. I know many people who are currently employed by different government agencies for cyber, as well as two cyber related business owners, and they also tell…