CYSE201S Journal5*

Cyber offending in module 5 is ranked within 7 motives. These seven motives for cyberoffending are based on psychological theory, psychodynamic theory, cognitive theory,neutralization theory, behavioral theory, personality theory, and reinforcement sensitivity. In thefollowing I will be expressing my thoughts on how each motive relates directly to cyberoffending, where they’re ranked (1-most to 7-least) and…

Journal 4 CYSE201S

Review Maslow’s Hierarchy of Needs and explain how each level relates to yourexperiences with technology. Give specific examples of how your digital experiencesrelate to each level of needThere is A pursuit of happiness and the desire of fulfillment that comes to everyhuman being during the journey of their life. As our life begins, we gradually…

Journal3 CYSE201S

As cybersecurity aspiring majors, we must devote time into developing ways on how to advance privacy protection security. Privacy is something we all deserve to have.  Rather that is within our homes, lives or computers.  Looking into PrivacyRights.org, I discovered that there was an increase in data breaches throughout the years.  The importance of this…

Journal2 CYSE201S

The principles of science and cybersecurity both relate within patterns and behavioral understanding. In cybersecurity, we conduct research like experiments. We find a problem, conduct a hypothesis and test them.  Often times our educational guess is correct and others, they’re wrong.  When our study is proven wrong, we redo the research and find other solutions to solve…

Journal 1 CYSE201S

As a cybersecurity major, I find that social science is very much useful in my field. As a future career I would not mind becoming a social engineer or professor.  Certain areas I would like to focus my career on are communication and teaching.  With both jobs I will be required to thoroughly communicate and…

Career Paper

Ester Martinez UriasApril 07, 2024CYSE201SCybersecurity and Social ScienceCareer PaperWhat would I want to do as a career with my Cybersecurity degree? As someone who is stillnew to the cybersecurity field, I have learned a lot! Especially here at Old Dominion University. Ihave learned so much about different types of cybersecurity job opportunities that there are,…

Article Review 2

Ester Martinez UriasCYSE201SMarch 24, 2024Article Review 2Adapting Social science in Iraq lawsThe following article that I chose for my Article 2 review was “Cybercrime Laws in Iraq: Addressinglimitations for Effective Governance.” As an American citizen learning cybersecurity, I know it isimportant to know how my country handles issues regarding cybercrime. But, it is also vital…

Article Review 1

Ester Martinez UriasFeb. 8, 2024CYSE201SArticle Review 1:Cyber IntelligenceAs we continue our digital journey, we learn more about advanced technologies and theirintelligence. Within the last two years alone, I have notice an increase in use of artificialintelligence amongst everyone. In the following article “Understanding the Use of Artificialintelligence in cybercrime” we dig deeper into the matter.The…

Protecting Availability

Being the CISO for a publicly traded company is a lot of responsibility.  With this job, I am to protect critical data and create privacy policies that overall secure my company’s information.  For starters, I will make sure employees of my company practice authentication and authorization procedures when entering or logging into company technology and accounts.  Limiting…

the human factor in cybersecurity

I have learned throughout my time here in cybersecurity that it is not always about the money spent on protecting servers with fancy gadgets or protection plans.  Often the safety of our data is centered around how well we push our policies. In order to help protect our data, I will be writing and sharing…