Journal 7

Explanation: The image shows the weakest link of cybersecurity. Many would assume that the the device would be the weakest link, but it reality many breaches and cyberattacks are caused by human error. Human centric cybersecurity recognizes the human element of the situation. Explanation: Even though recognizing a phishing email might be obvious to some…

Journal 6

One type of common scam involves fraudulent websites that impersonate legitimate sites in an attempt to trick users into downloading malware or divulging sensitive information such as a credit card. These sites will impersonate banking sites, popular commerce sites like Amazon or eBay, or well-known brands like Apple. Fortunately, there are several signs to look…

Journal 5

If ranking the motives behind cybercrime from 1 (making the most sense) to 7 (making the least sense) I would list them:

Journal 4

Maslow’s hierarchy of needs is a five-level pyramid showing the basic, psychological, and self-fulfillment needs that Maslow believed all humans attempt to meet. In ascending order, the levels are physiological needs, safety needs, belongingness/love needs, esteem needs, and finally self-actualization. As a lower level is satisfied, the person then focuses on the next highest level,…

Journal 3

The website PrivacyRights.org provides a vast wealth of important information regarding breaches that could benefit researchers. One image the website offers is a hotspot map of the United States showing the amount of reported breaches by state. From this, we see that the most targeted states include California, Texas, New York, Maryland, Massachusetts, Indiana, Illinois,…

Journal 2

While applying scientific principles to cybersecurity may not be obvious at first, examining the topic through a social science lens can help reveal the use of these principles. The first principle, relativism, is the view that all things are related to one another and is probably the easiest to relate to cybersecurity. As the use…

Journal 1

The NICE Framework describes seven broad work role categories commonly found within the field of cybersecurity. The categories that I found the most appealing were Protection and Defense as well as the Investigation category. Previously, I completed a course in Digital Forensics that I found truly fascinating. In that class, I got to use some…

Journal #13

The implementation and development of cyber-related policies and cyberinfrastructure present a unique problem given the often short sighted nature of humanity’s predictive knowledge capabilities. We can not just look at the immediate splash of new technological advancements, instead, we must consider the ripple effects that will come after. Today we have great potential to change…

Journal #12

The advances made in cyber technology have been nothing short of revolutionary, though it is not without its dark side. An example of this is the way it impacted the interactions between offenders and victims of cybercrimes. For example, there are the cybercrimes of cyberstalking and cyber harassment. Unfortunately, these are two very serious situations,…

Journal #11

Criminal justice is the study of crime, and cybercrime is a specific area of focus within criminal justice. This focus has been given the term cybercriminology. Criminal justice looks for ways to detect and handle criminal acts, how crimes should be punished judicially, and if the crimes can be prevented if possible. Cybercriminology is the…