This is a collection of article reviews done for my CYSE 201S class!
Tag: Cybersecurity
Journal Entry 8 – Reviewing Hacking in Media
From what this video shows, there is a decent bit of accuracy when it comes to hacking and cybersecurity in media. Of course, there are cases of the “Bypassing the mainframe…” and “Computer enhance…” moments in media, but the movies/shows that were showcased in the video all appeared to be somewhat accurate. The most egregious…
Journal 4 – Maslow’s Hierarchy of Needs and The Current Online Environment
The online experience and Maslow’s hierarchy of needs have a resounding correlation. The bottom tier, being physiological needs, is fulfilled by access to the internet via a device and a stable connection. Online security fulfills the safety tier. Things like having a secure account and practicing safe behaviors keep unwanted attackers from accessing personal accounts…
Journal Post 3 – Research on Security Breaches
Using the data provided by the “Q1 Data Breach Report,” I can see that the companies/organizations that are targeted the most are healthcare and business-related. This shows that these fields are not only important, but hold lots of data that could be valuable to cyber criminals. Researchers can use this information to predict which companies/organizations…
Journal Post 1 – NICE Framework interests
Oversight and investigation are the areas I am most interested in. Investigation seems very engaging as a career because of the problem solving and analysis elements. Oversight seems interesting due to the amount of roles I could play. A career in that area is probably constantly changing because of the sheer amount of responsibilities that…