Privacy is something we all crave and deem necessary for our day to day lives. We may not be hiding any major life secrets, but even the slightest hint of our information can create a major difference and chaos in our lives. Therefore, it is without a doubt, key that we protect and secure every…
Mother of Invention
Ester Martinez Urias Feb. 15, 2024 Phil355E Ethics of care tool for moral reasoning Mother of invention According to the mother of invention, it is based off of error, fear and suffering. Obi3 was a smart house designed by Anwuli’s ex-husband. This house did most, if not all of its own repairs and was designed…
Journal entry 6
Ester Martinez Urias Feb. 17, 2024 CYSE201S Journal Entry 6 Fake Websites! When entering a browser like Google, you may see that there are millions of websites to choose from. Within all of these websites, some may be fake pages or scammer sites. It is very important for online users to avoid clicking on these…
Journal entry 7
Ester Martinez Urias Feb. 25, 2024 CYSE201S Week 7 Journal 7 The first meme that I really enjoyed was the meme of a Pomeranian dog with glasses on a black laptop. In the list of memes, there was a lot of humans behind technology, but what I enjoyed about this cybersecurity framework was that it…
Journal entry 8
Ester Martinez Urias March 3, 2024 CYSE201S Journal Entry 8 The media today is what helps the general public know about things that go on in the world around us. Thanks to movies, we are able to get some perspective of different topics such as hacking. After watching the short video of a friendly hacker…
journal 5
Cyber offending in module 5 is ranked within 7 motives. These seven motives for cyber offending are based on psychological theory, psychodynamic theory, cognitive theory, neutralization theory, behavioral theory, personality theory, and reinforcement sensitivity. In the following I will be expressing my thoughts on how each motive relates directly to cyber offending, where they’re ranked…
Justice
As stated in my home page, I am a Criminal Justice/Administration of Justice major. When I first got into the learning process of our Criminal Justice system, I did not know what I wanted to do. I knew that helping others was a passion and priority for myself but I knew that I did not…
CYSE201S
As cybersecurity aspiring majors, we must devote time into developing ways on how to advance privacy protection security. Privacy is something we all deserve to have. Rather that is within our homes, lives or computers. Looking into PrivacyRights.org, I discovered that there was an increase in data breaches throughout the years. The importance of this…
CYSE201S
The principles of science and cybersecurity both relate within patterns and behavioral understanding. In cybersecurity, we conduct research like experiments. We find a problem, conduct a hypothesis and test them. Often times our educational guess is correct and others, they’re wrong. When our study is proven wrong, we redo the research and find other solutions to solve…
CYSE201S
As a cybersecurity major, I find that social science is very much useful in my field. As a future career I would not mind becoming a social engineer or professor. Certain areas I would like to focus my career on are communication and teaching. With both jobs I will be required to thoroughly communicate and…