Cybersecurity analysts deal with cybercriminals that use human psychology to gain access to systems. So understanding social behaviors is necessary to stop phishing and impersonation tactics. Analysts may also be responsible for training employees. Educating them about social behaviors can help identify potential threats. They also often investigate breaches when they occur, to understand how…
How do you think the media influences our understanding about cybersecurity?
The media can affect the world in both good and bad ways. First, the media can influence our understanding of cybersecurity by public awareness. The purpose of media in the first place is the inform people of world events. Whether it creates fear among the public, news stories can educate the public about the risks…
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I received a score of 4 on the Social Media Disorder scale. I think that I have a much below average score than most people my age. Especially living in a time of technology, people would even say that social media is a must in order to keep in touch with friends and family. I…
Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.
Meme: Wow, this internet is good! The man is in a public cafe, as you can see. This relates to the framework for human systems integration since it’s critical to inform individuals about the dangers associated with particular actions. Public Wi-Fi can be one of the riskiest networks to utilize when it comes to internet…
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
There are many things that anybody can spot in a fake website. First, look at the URL. Misspelled names, extra characters, or unusual extensions (.xyz,.info, etc.) usually means the website is fake. Also ensure the URL begins with “https://” instead of just “http://”. The “s” indicates a secure connection, which is more common for legitimate…
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
(1). Money is a powerful motivator for a lot of people because it addresses basic needs and desires, such as access to resources, comfort, etc. (2). We as people often seek recognition for achievements and contributions, which satisfies our psychological needs for self confidence and accomplishment. (3). Individuals can become passionate about their beliefs in…
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs is a psychological theory that arranges human needs into a pyramid, with basic needs at the bottoms and high-level needs at the top. It’s a framework to see how technology can impact these needs. The most basic of needs, such as food, water, and shelter, doesn’t exactly play a crucial role…
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Researchers can use this information to study breaches in multiple ways. They can collect data on different aspects of data breaches, including the number, affected organizations, types of data compromised, and the methods of breach. They can then analyze it to identify patterns over time, such as changes in frequency or severity, to allocate resources…
What do you think about the principle of determinism as it relates to computer hacking?
Determinism is the idea that if you have enough information about a system and its vulnerabilities, then you can predict the outcomes of your hacking activities with low certainty of risk. In other words, a process where the outcome can be predetermined. But just because hackers can leverage their known vulnerabilities, doesn’t mean that they…
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
The area that appealed to me the most was investigating. Although I feel as though I am most knowledgeable on criminal behavior and laws relating to the cybersecurity world, I have wanted to be a digital forensics analyst for years. I also like working “behind the curtains”, since I don’t prefer attention. What appealed to…