Journal 6

Fake websites contain ads for products that don’t exist. They create ways to steal personal information. Fake websites are designed to get information at all costs. Fake websites try to replicate real websites. Real websites are designed with a purpose and prove that the product or personal information is going to a legit place. The language on each website is also a great indication of the authenticity of the website. Real websites contain websites contain language that was approved by a corporate representative compared to the slight or obvious spelling mistakes. Some websites are obvious with their intent and make it easier to determine if the website is real or not. The domains of the websites may appear to be the same at a quick glance. An example of this is https://www.apple.com and https://www.app1e.com . Now while it is obvious which is the real one, it is possible for people do not to realize the difference between them. The security of the website will also be a clear indication of the website being real or not. There are many other deceiving websites that try to trick users that are not paying attention.

Toohil, Ryan. “How to Tell If a Website Is Fake: 12 Warning Signs.” Www.identityguard.com, 21 Feb. 2024, www.identityguard.com/news/how-to-tell-if-a-website-is-fake.

Journal 5

The order I put the individual motives are multiple reasons, revenge, for money, recognition, curiosity, entertainment, political, and boredom. Motives that involve multiple reasons are on the top of my list because it doesn’t take one singular reason to commit a crime. I’m a firm believer that emotions compound overtime and if it is left unattended to, horrific things can happen. Revenge is a classic motive when looking for the reason behind a crime.  It’s like crime and revenge, belong together and you can’t have one without the other. Motives that involve money are also classics of crime. It seems easier to commit crime when there is a financial upside at the end of it. Recognition is a motive for those who only want the public attention that comes with committing crime. Some criminals need the public to know who they are and what they are capable of. Curiosity is a motive that isn’t based upon any true vendetta. Crimes that are committed out of curiosity are committed to see if the crime was possible to begin with. Entertainment is a motive that happens when the criminals want to create a public display of their crime. These crimes are committed for the fun and thrill of it. Political motives are just frustrating when it is revealed that politics played a factor in why a certain crime was committed. I don’t put much stock into politics and maybe my lack of knowledge or care makes any political motive complete nonsense. The final motive is boredom. The reason boredom is last because it is just a nothing reason given by criminals to get a reaction from their victims. There is no emotion or thought when the motive of a crime is boredom.

Journal 4

Maslow’s Hierarchy of Needs can be separated into these three groups: Basic needs, Psychological needs, and Self-fulfillment needs. Basic needs are separated into two categories the Physiological needs and Safety needs. The physiological needs include food, water, warmth, and rest. My experience with the physiological needs are similar to everyone in my opinion. Everyone uses technology to pay for food, water, and heating bills. I use technology as an alarm to wake up in the morning and to time my break while I’m at work. Safety needs include security and safety. I use technology to arm the security alarms at my house to ensure that it is secured while I’m away. I believe that safety is a direct result of security. Psychological needs are separated into two categories the Esteem needs and the Belongingness and love needs. The esteem needs include prestige and feeling of accomplishment. My technology experience with esteem needs involves passing tests or exams that are on the computer. I was on the robotics team in middle school and my team was able to put the yoga ball into the tower and the other team couldn’t. That was an impressive accomplishment and I’m still proud of that. The belongingness and love needs include intimate relationships and friends. I use technology to see what my friends are up to and how they are doing. Social media is the primary way I have any idea of what my friends are doing in their lives. Self-fulfillment needs contain one category and it is Self-actualization. Self-actualization includes achieving one’s full potential, including creative activities. I use technology to improve myself to better understand the people around me and people all over the world. I use technology to learn about the struggles and success of people and the importance of those struggles and successes. I use technology to create new things and share them with my friends.

Journal 3

Researchers might use the data to study the patterns in security breaches. The patterns used can indicate how the hackers are able to breach the system security. Once the pattern is discovered the security can be updated and secured appropriately. Researchers can also determine the trend of the security breaches. If similar businesses experience security breaches around the same time, the breaches might be connected to the same group. If it is determined to be the same group committing these attacks the researchers can determine their method used to commit the breach. Once the method is discovered researchers can better equip a security system to be prepared for those kinds of attacks.

Journal 2

Empiricism enhances cybersecurity practices by studying behavior and not relying on opinions or hunches to determine the understanding of cybercrime and cybersecurity. It is also combined with prior experience to determine the state of cybersecurity and cybercrime. It focuses on the senses touch, smell, sight, and hearing. Cybersecurity is not the place to allow opinions on cybercrime to determine the security measures that are put in place to ensure the safety of the data. Cybercrime needs to taken just as seriously as the crime that happens in day to day life. Just because the crime isn’t physically seen doesn’t diminish the dangers that could be brought on by it being treated less than crimes that are physically seen.

Journal 1

I want to focus my career on the Implementation and Operation (IO) and Protection and Defense (PD) of the NICE Workforce Framework. There are two jobs that are the most appealing to me and they are Database Administration (IO) and Incident Response (PD). I hold an Associate’s degree in Information Technology Database Specialist from Tidewater Community College (TCC). I’m familiar with the systems and processes of maintaining and running databases. I’ve used the programming languages Python, Java, SQL to operate databases. Incident Response provides the best opportunity to learn weaknesses and fix them. The least appealing job is Cybersecurity Legal Advice. That is a job best suited for those who have a concrete understanding of how the legal world functions.