Journal 4 – Maslow’s Hierarchy of Needs and The Current Online Environment

The online experience and Maslow’s hierarchy of needs have a resounding correlation. The bottom tier, being physiological needs, is fulfilled by access to the internet via a device and a stable connection. Online security fulfills the safety tier. Things like having a secure account and practicing safe behaviors keep unwanted attackers from accessing personal accounts…

Journal Post 3 – Research on Security Breaches

Using the data provided by the “Q1 Data Breach Report,” I can see that the companies/organizations that are targeted the most are healthcare and business-related. This shows that these fields are not only important, but hold lots of data that could be valuable to cyber criminals. Researchers can use this information to predict which companies/organizations…

Journal Post 2 – Empiricism

Empiricism is an essential principle in any science, and in cybersecurity, it plays a critical role in enhancing protection. By analyzing patterns in user behavior and system data, security teams can identify potential threats and prevent cybercrime before it occurs. This proactive approach allows for the early identification of suspicious activity, which is crucial for…

Journal Post 1 – NICE Framework interests

Oversight and investigation are the areas I am most interested in. Investigation seems very engaging as a career because of the problem solving and analysis elements. Oversight seems interesting due to the amount of roles I could play. A career in that area is probably constantly changing because of the sheer amount of responsibilities that…