#5
Journal EntryReview the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it • Political https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms #1 I think political reasons to hack is one of the top reasons. Political reasons are one of the strongest there are. People will do anything to fight for what they think...
Read More#4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. The psychological level of Maslow’s needs related to technology is when you lose your phone. Your have a need to get it back an urge. or when you have a water pump that pumps your water to your house it is the bare minimum we have gotten used to and couldn’t function without. The Safety level of Maslow’s needs related to technology is alarm systems and CPAP machines and phone systems...
Read More#1
Review the NICE Workforce Framework. Are there certain areas thatyou would want to focus your career on? Explain which areas wouldappeal the most to you and which would appeal the least.Workforce Framework for Cybersecurity (NICE Framework) | NICCS(cisa.gov)
Read More#3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. PrivacyRights.org seemed to be a site dedicated to notifying companies of new attacks that are possible, have happened, and also laws that companies should be aware of. On top of all these main features of the site it had a database of all past attacks on companies. This database had the name of the company, the state it was in, the date of the breach, type of attack, type of company, and location of the...
Read More#2
Journal EntryExplain how the principles of science relate to cybersecurity The principles of science relate to cyber security in multiple ways. One way it relates is the scientific method. There has to be studies done on cyber security, criminals, and users in order to predict how they will operate so cyber security professionals can protect a company from users and hackers. The best way to perform these studies is using the scientific method.
Read More