Article Review #2

Article Review #2; How even the most cautious can fall for phishing trapsEli WallaceDepartment of Cybersecurity, Old Dominion UniversityCyse 201SProfessor Diwakar YalpiNovember 16, 2024 Introduction There are many different ways a person or even a robot can fall for a trap on the internet. An example of one of these traps would be phishing. There…

Article Review #1

A review of Cybercrime Laws in Jordan and Freedom of Expression: At what point dolaws interfere with rights?Eli WallaceDepartment of Cybersecurity, Old Dominion UniversityCYSE210SProfessor Diwakar YalpiOctober 1, 2024 A review of Cybercrime Laws in Jordan and Freedom of Expression: At what point do laws interfere with rights? Introduction Cyber laws are made to stop criminals…

Journal Entry #5

The motive I think that makes the most sense (1) is multiple reasons, because it could be more justifiable. The second motive (2) I would say to be for money because its most of the time safer for all parties if its digital. The third motive (3) would be for revenge which I’m not a…

Journal Entry #4

Maslow’s Hierarchy of needs can relate pretty well with technology because technology has different levels of needs. For one when you look at the Physiological needs you can relate that to the basic needs of technology like power. There are a couple other things that can go into that level but power is super important…

Journal Entry #3

Privacy rights has a vast amount of information on security breaches. This information includes different types of breaches as well as information to prepare against a possible data breach. While reading one of the many articles posted on PrivacyRights.org I found that they had mentioned that they had been tracking security breaches since 2005. They…

Journal Entry #2

The principles of science relate to cybersecurity in many ways and for many different reasons. The correlation isn’t as easy as just connecting terms together that match or by one event matching another. There are some topics that are more easily relatable like for example you can set up an antivirus program but you won’t…

Journal Entry #1

The NICE Workforce has a lot of interesting topics that make up the whole of it. Personally the investigation section would probably the section that I am most interested in because I would like to hopefully work for law enforcement while doing cyber. I think that the tools that they use and the elements that…

Journal #13

It is always a slight curveball when trying to approach new developments of cyber policy and infrastructure. The “short arm” of predictive knowledge is to throw the viewpoint that there is not a completely thought out idea that the final decision will or will not bear consequences. When approaching cyber policy it is vital to…

Journal #12

Cyber technology is a gift and a privilege but that doesn’t mean that every single person will use technology responsibly. There will be those select few that will continue to do activities that are morally wrong. People can do all types of things in real life and then they have to face the consequences but…

Journal #11

Cybercrime and criminal justice are two very important topics that deal with the same general concepts. There are things that make them different though even though they are similar. To understand what parts overlap in each topic you have to look at the definition of both and then compare them. Criminal justice is a more…