There are multiple ways to spot a fake website but here are the three that I chose. The first is to view the certificate information. Depending on your browser of choice, this can be found by selecting the lock icon in the URL bar. If the site is real, it will have valid certificates and the lock will appear closed.… Read more →
Author: atuck022
Journal Entry Five: Motivators Ranked One-Seven
I will confidently say that money is the most common motive to commit a cyber crime. They can steal the information and then sell it or hold the information ransom. Money gets a rating of One. The second motive in the ranking goes to Multiple Reasons. This can be a combination of money and political or political and revenge. Multiple… Read more →
Journal Entry Four: Maslow’s Hierarchy of Needs
The levels of Maslow’s Hierarchy of Needs can be linked to human experiences with technology, as its use continues to play an integral role in our lives. Our physiological needs can be met by using technology to help us obtain food, water, and shelter. I can rent an apartment and purchase groceries through apps like door dash without having to… Read more →
Journal Entry Three: Investigating Data Breaches with Available Information
As we can see from the data presented by PrivacyRights.org, the number of data breaches, and those affected, have decreased significantly since 2005. Researchers can utilize this public information to investigate data breaches by carefully analyzing the information that has been disclosed or leaked. This can include studying breached data sets, examining hacker forums, dark web marketplaces (where the stolen… Read more →
Journal Entry Two: Cybersecurity and The Principles of Science
In the twenty-first century, digital threats constantly evolve and security breaches are a common occurrence, these principles of relativism, determinism, parsimony, ethical neutrality, and objectivity play a significant role in shaping our approach to protecting digital arenas. Relativism reminds me of the importance of acknowledging the diverse cultural and ethical perspectives that influence cybersecurity. As I work in this field,… Read more →
Journal Entry One: NICE Framework
In my upcoming Cybersecurity career, the three categories of NICE framework that interest me the most are: Protect and Defend, Analyze, and Securely Provision. Active work on a watch floor (Protect and Defend) as a cyber analyst sounds the most appealing with plenty of action to boot. That position would create a work environment that changes daily which would keep… Read more →
Hello World!
This is a post. Use posts to update your blog. Read more →