After watching the video, I believe there is a lot of media can and has done to misconstrue the public’s view on cybersecurity. First, most media portray hacking and cybersecurity as a quick and easy task if you know what to type, when completing these process actually takes hours or even weeks. Both securing a…
Category: 201S Journal
Journal #7
Meme: When your boss finally gives you a five cent raise for tirelessly defending his company from cyber-attacks daily. This is the main security professional that works at the company. He is the first line of defense within the company, who does all the training and creating the programs and firewalls to keep the company…
Journal #6
Spotting fake websites. The three that were spotted were a PNC banking app, Amazon, and the myODU. First, the PNC banking app seemed normal until a popup happened and asked to update all personal information. Once the popup was clicked it took you to another page where the web address looked weird, and when further…
Cybercrime Victimization (Article Review #1)
Cameron White, Feb. 11, 2024 Introduction This article review will be about how interpersonal cybercrime effect people on the internet and in the metaverse. Interpersonal cybercrime is defined as “any act of criminal activity in cyberspace by an offender against another individual through digital interaction and communication, whether they have a legitimate or imaginary relationship”…
Journal #5
Out of the seven motives given I believe the one that makes the most sense or that is the biggest motivator for people is “multiple reasons”, followed by money, political views, revenge, entertainment, recognition, and lastly boredom. The reason I believe “multiple reasons” is first is because not many people do something, especially a…
Journal #4
Maslow’s hierarchy of needs describes the hierarchical nature of human’s. The hierarchy is a pyramid with five levels, form the most basic to more complex needs at the top. The five levels withing it are are physiological needs which is things needed for human survival, safety needs, love and belongingness needs, Esteem needs, self-actualization need…
Journal #3
The PrivacyRights.org website talks about many different topics. They talk about how to reduce spam and possible attacks as well as talking about what people would be looking at stealing from you over the web. Lastly, they have an interactive map where you can visit the state’s legislative page to see the laws. First,…
Week 2 Journal #2
The principles of science can be applied to cybersecurity in various ways, contributing to the development, implementation, and improvement of security of the network. Cybersecurity professionals will first have to use logical reasoning and critical thinking skills to respond effectively with the right solution. Next, they will need to be able to come up and…
Journal #1
While all the sections within the NICE Workforce Framework have at least some subsections, I would enjoy the section “Protect and Defend” Interests me the most and would be the one I would want to focus my career on in the future. Being able to analyze and actively defend data for people and companies makes…