If ranking the motives behind cybercrime from 1 (making the most sense) to 7 (making the least sense) I would list them:
Category: CYSE 201s
Journal 4
Maslow’s hierarchy of needs is a five-level pyramid showing the basic, psychological, and self-fulfillment needs that Maslow believed all humans attempt to meet. In ascending order, the levels are physiological needs, safety needs, belongingness/love needs, esteem needs, and finally self-actualization. As a lower level is satisfied, the person then focuses on the next highest level,…
Journal 3
The website PrivacyRights.org provides a vast wealth of important information regarding breaches that could benefit researchers. One image the website offers is a hotspot map of the United States showing the amount of reported breaches by state. From this, we see that the most targeted states include California, Texas, New York, Maryland, Massachusetts, Indiana, Illinois,…
Journal 2
While applying scientific principles to cybersecurity may not be obvious at first, examining the topic through a social science lens can help reveal the use of these principles. The first principle, relativism, is the view that all things are related to one another and is probably the easiest to relate to cybersecurity. As the use…
Journal 1
The NICE Framework describes seven broad work role categories commonly found within the field of cybersecurity. The categories that I found the most appealing were Protection and Defense as well as the Investigation category. Previously, I completed a course in Digital Forensics that I found truly fascinating. In that class, I got to use some…