Module 11 Bug Bounty
The second part of this week’s journal entry was an article review, which discussed bug bounty policies, and how researchers...
Read MoreModule 11 Case Study
This week, we were given a sample of a data breach announcement that was “sent” to customers of the affected website. Two...
Read MoreModule 10 Article Journal
This week’s journal entry was an article review about information warfare, national security and the effect cybersecurity has on it....
Read MoreSMD Scale – Module 9
This week we were given the instructions to take the Social Media Disorder Scale and report our scores. I scored fairly average I believe,...
Read MoreHacking Movies – Are they Real? Module 8
For this week’s journal entry, we were given a reaction video to watch and to explain how media has an effect on how individuals...
Read MoreArticle Review 2
The article I chose for this week’s article review was “Cyber threat severity rises during holidays”. This article, by...
Read MoreArticle Review 1
For the article review, I chose an article written on the subject of Cyberbullying and delving into the view of the affects that it has on...
Read MoreReview the articles linked with each individual motive (individuals and crime). Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
The 7 motives given are Entertainment, Political, Revenge, Boredom, Recognition, Money, and Multiple Reasons. The highest, or make the...
Read MoreReview Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs has 5 different levels of needs. The first level, being the physiological needs such as food, water,...
Read More