Social Cybersecurity

In this module, we were provided an article in which to provide a response to. As someone who has been working within the Department of Defense for twelve years, the information is certainly not new. The significance of the human factor within any enterprise has always remained the must vulnerable to attack and exploitation. What…

The Media: Shaping Perception

In this week’s module, we explore the perception of hacking and cybersecurity as portrayed by Hollywood’s blockbuster movies. While there are endless examples of just how cool it looks to hack a mainframe, or explore the matrix, it has certainly done much to obfuscate the realities of cybersecurity. Whereas hacking has much, if not all…

The Social Media Scale: My Take

In Module 9, we were presented a series of questions to capture a snapshot of our social media use. Fortunately for me, social media is something I have been off of, going on almost a decade. The scale offers insight into a broad range of use and series of questions regarding how social media is…

Illegal Cyber Activities

Andriy Slynchuk presents an interesting subject of common laws that are broken regularly, but are they are serious as they seem? Amongst the list of 11 offenses, I present to you the top 5 (in no order), which to me, are the most egregious.

Human Systems Integration: A Process

While cybersecurity continues to find commonalities within psychology, the methodologies of training are subject to change. While this meme may poke fun at the typical computer based trainings, it does become rather clear that there will certainly be an updated training schedule on the horizon..

Cybercrime: Driven by Needs?

In our latest module we were provided 7 articles which encompassed reasons why some are attracted the life of cybercrime. We were asked to rank these motivations from “most sense” to “least sense”:

Maslow’s Hierarchy and Me

Abraham Maslow in 1943, proposed a hierarchy of the basic human needs broken down in to several different layers. Several decades later, we as a society have integrated technology into our every day lives, so much so that it too has found a home into our psyche as Maslow once illustrated. The base of this…

Data Breaches: Lessons Learned?

Data breaches are an unfortunate reality of technology in the 21st century. Although significant amounts of resources are invested into developing data security, there is still an alarming amount of flaws that are exploited by those who would wish to access private information. According to privacyrights.org, a self described “nonprofit organization focused on increasing access…

NICE Framework: What does it mean to me?

According to a 2023 Statista Research Department graphic, the United States boasts a whopping 755,743 cybersecurity position openings as of February. Given that cybersecurity professionals are in such high demand, there has to be something more to it, right? The Workforce Framework for Cybersecurity (NICE Framework) has an equally impressive breakdown of the vastly different…