ENTRY #11

Using illegal streaming platforms is a serious offense because companies lose out on millions of dollars due to people pirating their streams. They often try to sue the people if they are able to catch them, but it is difficult. Using copyrighted material is another serious offense. Authors put their blood, sweat, and tears into…

ENTRY #10

This article discusses social cybersecurity and how it is vastly growing  all around the world. Social cybersecurity is a new branch of cybersecurity that examines how changes on human behavior, brought on by the internet, impact social, culture, and political results. Information is utilized to support a message while dividing the culture, society, and values…

ENTRY #9

I scored a 1.0 on the Social Media Disorder Scale. I am not surprised about my score because I try my best not to revolve my life around social media. I think the items were pretty serious and I was shocked by some of them. I think the leading cause of extreme social media use…

ENTRY #8

The media plays a large role in how we understand cybersecurity. Media gives us the ability to spread information across the world virtually. This can be great especially when you need to spread awareness about something important. An example of this in the cybersecurity world is creating awareness about cyber threats going around. A good…

ENTRY #6

This is a website that states President Obama signed an executive order banning the pledge of allegiance in all public schools. If you look at the top of the website, the domain is physically on the website which is the first red flag.  http://www.thedogisland.com/ This is another fake website that states there is such thing…

ENTRY #5

I would rank hacking for money first because our world revolves around money and lots of people will do anything for financial gain so this one makes the most sense to me. The second ranked is political motivations because people in America are obsessed with power and fame. There are some cases where politicians may…

ENTRY #4

Maslow’s hierarchy of needs is the theory that human needs dictate their behavior. Regarding physiological needs, some examples can be communicating online if you live far from somebody, ordering food online with grubhub or UberEats, or tracking your steps. While technology is very beneficial and is critical to Maslow’s theory, for some people it becomes…

ENTRY #3

From reviewing Privacyrights.org, I found that it includes the number of breaches in the US along with a list of laws per state about the disclosure of data breaches. It also contains a bar graph of the organizations with the largest number of reported breach notifications. Researchers could use this information to study the recent…

ENTRY #2

There are six principles of science which are determinism, parsimony, relativism, objectivity, ethical neutrality, and empiricism. Determinism is the principle that actions are influenced or determined by past experiences or events. This principle relates to cybersecurity because certain actions made online could be caused by past experiences. For example, an employee may receive threats from…