Career Paper
Career-PaperDownload
Career-PaperDownload
The second part of this week's journal entry was an article review, which discussed bug bounty policies, and how researchers identified and got rid of the bugs in their programs.…
This week, we were given a sample of a data breach announcement that was "sent" to customers of the affected website. Two different Economic Theories that goes into this sample…
This week's journal entry was an article review about information warfare, national security and the effect cybersecurity has on it. With the ever-increasing use of technology worldwide, steps must be…
This week we were given the instructions to take the Social Media Disorder Scale and report our scores. I scored fairly average I believe, with the process being a little…
For this week's journal entry, we were given a reaction video to watch and to explain how media has an effect on how individuals view cyber security. After watching the…
The article I chose for this week's article review was "Cyber threat severity rises during holidays". This article, by Vikki Davies delves into the Criminology and Sociology aspects of the…
For the article review, I chose an article written on the subject of Cyberbullying and delving into the view of the affects that it has on the LGBTQ community. This…
The 7 motives given are Entertainment, Political, Revenge, Boredom, Recognition, Money, and Multiple Reasons. The highest, or make the most sense, would be (1) Entertainment. Entertainment is #1 due to…
Maslow's Hierarchy of Needs has 5 different levels of needs. The first level, being the physiological needs such as food, water, warmth, and rest. In today's world, technology has become…