With the evolution of the internet the tactics of scamming evolved as well. If you are not aware of the numerous tactics that are used or examples like fake emails to get you to put your information in it could lead to anyone being taken advantage of. To the untrained eye, it can be almost…
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology
Physiological needs relate to my experiences with technology as it’s like the internet, you can still use technology but internet gives you the power to search amongst the web which is endless. Physiological needs are basic needs like food and water, to me basic needs for technology are internet. Safety needs relates to my experiences…
Article review #1
Dante Scaramazzo CYSE201S 10/1/2022 Article Reviews Journal 1: International Journal of Cyber Criminology “Cyber Violence with Biosocial Perspective and The Role of Preventative Legislative Mechanism” By: Slamet Suhartono Suhartono’s main research question in writing this article was, “to know how the administrative or legal mechanism of a nation could attempt to understand the biosocial perspectives…
Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
If I had to rank the 7 motives from 1 to 7 on what I think makes the most sense I would say: 1. For money 2. Multiple Reasons 3. Political 4. Recognition 5. Entertainment 6. Boredom 7. Revenge I put money at #1 because I feel like most people start finding loopholes and ways…
Are there certain areas thappeal the most to you and which would appeal the least.
Protect and Defend, Investigate and Securely Provisions appeals to me the most. I would want to focus my career on either investigate or protect and defend. I feel those are some areas I could really dive into and not be upset about devoting my life to. Securely Provision is interesting but I’m not sure if…
How might researchers use this information to study breaches? 
Researchers might use this information from the site to study breaches because all of the types of breaches and types of businesses are listed and explained. This site is a hub of information, with all the resources you need as well as advocacy. The site believes that everyone deserves the opportunity to be informed. You…
Explain how the principles of science relate to cybersecurity
The science of cyber security is the study of relations between attributes, structures and dynamics of: violations of cyber security policy; the network of computing devices under attack; the defenders’ tools and techniques; and the attackers’ tools and techniques where malicious software plays the central role. The science of cybersecurity develops a coherent family of…
The Legal System Response to Technological Advancements Write-Up
Technology is so strong with the internet that news and posts can go viral in seconds leaving our government and legislative bodies with predicaments on what to do and how to address them. There are now pages of local cities in states around the country that have twitter accounts and post on them generally to…
SCADA Systems Write-Up
SCADA is a system of hardware elements as well a system of software that allows industrial organizations to monitor, gather, and process real-time data. Industrial control systems, such as SCADA systems and other OT systems, serve as the foundation for critical infrastructure. The cyber security infrastructure needs to be at the highest level for its…
CyberSecurity in the Biological Sciences Industry Discussion Board
From my week 5 readings especially, it is so important to know that your lab and personal information like our DNA must be max protected at all times. At first, I would conduct a risk assessment so I can determine the vulnerabilities among my lab as well as accounts holding personal information such as the…