Journal Entry #4

Physiological needs: This is the need for survival. In relation to technology, I would use it to order food or services to acquire the essentials necessary for my survival. Safety needs: These are things that keep me safe. My phone, or a computer system connected to my ISP’s network, allows me to call the police or other…

Journal Entry #3

PrivacyRights.org provides detailed public information on data breaches, including the type of organization, number of individuals affected, method of breach, and location. Researchers can use this information to identify patterns in cybersecurity incidents and track which industries are most vulnerable to attacks over time. By examining the frequency, size, and cause of breaches, researchers can…

Journal Entry #2

Empiricism enhances cybersecurity by emphasizing data driven decision making. Empirical data collection, such as network traffic patterns or incident logs, enables the identification of emerging threats based on observed behavior. This comes in both data as qualitative and quantitative. Analyzing this data assists in assessing the effectiveness of existing security measures, revealing vulnerabilities or gaps….

Journal entry #1

Since my major is computer science, I would look for a profession that loosely involvesprogramming so I can utilize the skills I’ve been developing over the years. The first job thatcomes to mind is secure software developer. These professionals design, maintain, andmodify systems to protect clients on the web. Their applications serve as frameworks thatsafeguard…

Home

This is my Cyse e-portfolio. This is my introduction to Cyse. This will be a temporary page to help me learn how to make these and additionally help make my own later for my CS e-portfolio.