HSI seems like an after thought as most cybersecurity professionals are not focused on the human element. Instead, they focus on the systems, process, or software. It is unfair to say that these professionals are out of touch, especially when you consider the lack of research on it, but it seems that they will focus…
Author: dmuel003
Module 6 journal
An interesting podcast I listened to, DarkNet Diaries, talked about how he knew he was at a fake website but only caught it because his username did not auto-populate. This of course is an indicator that the site is not federated nor the real site. However, one of the biggest ways to know if a…
Article 1 Review
The article I chose to review, Friction, Snake oil, and weird countries: Cybersecurity systems could deep global inequality through regional blockingby Anne Jonas and Jenna Burrell, has a simple premise: fairness. Let me first answer the rubric questions using parsimony before I delve into my thoughts. How does the topic relate to social science principles?…
Module 5 Journal
Money, politics, multiple reasons, entertainment, boredom, recognition, and revenge. These are the motives with which I was tasked to rank from 1-7 (most sense to least). I ranked money as number 1 because of my personal beliefs. Money is the great motivator, and everyone has a price. That being said, stealing from people online with…
Module 4 Journal
Module 4 Journal Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs (MHN) is a theory of ones needs based on order of importance. Traditionally, MHN is a pyramid of…
My New Desk
About a month ago, I was gifted a massive slab of white oak. It was warped, covered in holes, and had large cracks; it could have easily become firewood. However, what wasn’t readily seen was the potential it could become. I could have made a hundred pen blanks or multiple cutting boards but I opted…
Module 3 Journal
Visit privacyrights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. The website privacyrights.org is a repository of information dedicated to navigating and reporting the data privacy laws for the average person. As part of the Privacy Rights…
Module 2 Journal
Explain how the principles of science relate to cybersecurity. In today’s lecture, social science was linked to the same principles (relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism) as natural science. There are principles of social science that when defined and manipulated can be layered over cybersecurity and act as a guide in order gain…
Module 1 Journal
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. https://niccs.cisa.gov/workforce-development/nice-framework I am familiar with tying together various concepts to decipher, or trouble shoot a problem. Having come from a personal training…