This video shows how society glorifies crime and, in this case, it is scamming credit/debit cards to get money. This goes to show how just about anybody can do it and if the world is making it seem like it’s fun thing to do then more people will want to do it. Like we talk…
Journal Entry 9 12 years old hacker (CYSE201s)
My thoughts on the 12 years old hacker are for one it is amazing that someone that young can hack into so many things and gain so much intel just by being connected to a Wi-Fi or Bluetooth signal. On the other hand, it is a bad thing because just like it was said in…
Journal Entry 8 (CYSE201s)12 hacking scenes
I believe that the media tells a lot of the truth when it comes to cyber related things but a lot of it is so exaggerated that people from the outside looking in believe that it happens way faster than it actually does. I think they do that for the sake of the film. People…
Sandra’s video-Journal Entry 6(CYSE201s)
In Sandra’s video I believe the factor that interested me the most is how many options you have. The way that technology is rising it is bringing more and more jobs in for people in the cybersecurity/computer science field which means even if you do not know what you want to be right now by…
Motives for Cyber Crime-Journal Entry 5(CYSE201s)
1).Political Motive-The article that talks about the political motive is the best and that is because it bigger purpose that just itself or themselves if it is a group of hackers committing cyber crime. committing a cyber crime for political reasons makes more sense because your people aware of things that going on and even…
Is it ethical- Journal entry 4(CYSE201S)
Is it ethical to watch someone is cyberspace without them knowing? No, I do no think its ethical but, I think that it is needed. If someone knows that they are being watched through the screen then their behavior would different then if they thought that their was not anyone watching them. For an example,…
Journal Entry 3(CYSE201S)
A Researcher would use the information of a former criminal in their studies to see how much a person would tell a researcher compared to what has been actually proven. When people chose to speak up and tell something they are biased towards themselves so they might change up the truth to make their reasoning…
Journal Entry 1- Anne’s Behavior(CYSE201S)
Ann’s Behavior is related to cybersecurity because if she had never clicked the link to that email and got caught uo in a phishing attack then it wouldn’t of happen. Phishing attack one of the most common cyber attacks to happen to anyone and a lot of people fall for them because it looks so…
Journal Entry 2-NIST Cybersecurity Frame work(CYSE201S)
An Organization receives a place to start with the NIST Framework. It provides a very detailed description about the basics of physical and computing security. The area that I would like to focus on the most would be computing security . Specifically I would like to be a ethical hacker. Reason being is that I…