Week 5 Journal Entry

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. Sometimes people commit cybercrimes…

Week 4 Journal Entry

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs was created to explain a human’s basic needs. All of theneeds are positioned in the shape of a pyramid, with the…

Week 3 Journal Entry

Visit PrivacyRights.org. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Researchers can use this information to better educate themselves with information on over 70,000 incidents. This database updates monthly, which will provide updated information, as well as observe trends to determine what…

Week 2 Journal Entry

The principles of science relate to cybersecurity in numerous ways. Determinism: Determinism means that an outcome is caused or influenced by a preceding event. When related to cybersecurity, determinism is that an attack had occurred because of a previous event. An example of this would be if an employee opened up a phishing email and…

Week 1 Journal Entry

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)Links to an external site.