Journal Entry 8

Daniel Cobb Journal Entry #6 201S March 3, 2024 After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity? So the video shed light on how media often distorts our perception of cybersecurity. It was a reminder of how much influence media has on shaping our…

Journal Entry 6

Daniel Cobb Journal Entry #6 201S February 18, 2024 Fake website are hard to spot at first sight so that why when logging into a website need to pay attention to detail. In this example above we can clearly see that the Facebook URL has been changed indicating that an outside source or third-party has…

Journal Entry 5

Daniel Cobb Journal Entry #5 201S February 10, 2024 Ranking’s of the motivations of individuals behind cybercrimes While I don’t condone any form of crime, cybercrime can sometimes seem more understandable because of the motives behind it. By recognizing why people turn to cybercrime, we can work towards preventing it and creating a safer online…

Journal Entry 4

Daniel Cobb Journal Entry #4 201S February 4, 2024 Maslow’s Hierarchy of Needs Maslow’s hierarchy of needs suggest that all human’s have needs that exist on a hierarchy. The theory claims as we meet our basic needs at the lower-level, we move to focusing on our upper-level needs. relating this to technology is no different,…

Journal Entry 3

Daniel Cobb Journal Entry #3 201S January 28, 2024 Benefits of Information Information is crucial when it comes to anything and researchers especially benefit from gathering information as it can aid them in understanding concepts. Researchers can benefit from studying cyber breaches using public information about breaches can help better prepare someone this can provide…

Journal Entry 1

Daniel Cobb Entry #1 CYSE 201S January 13, 2024  NICE Workforce Framework Looking into the NICE Workforce Framework, there is one area that I think I would enjoy the most – Protect and Defend (PR). My reasoning is because of the roles within cybersecurity that typically involve implementing and managing security controls to protect systems…