The article review should focus on (1) how the topic relates to the principals of the social sciences; (2) the study’s research questions or hypotheses; (3) the types of research methods used; (4) the types of data and analysis done; (5) how concepts from the PowerPoint presentations relate to the article; (6) how the topic…
Author: ihagm001
Module 5 Journal Entry
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. • Entertainment https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/• Political https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms• Revenge https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/• Boredom https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/• Recognition https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/•…
Module 4 Journal Entry
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Starting from the bottom, I would say that physiological needs with technology would be having some way to interact and something to interact with. Such…
Module 3 Journal Entry
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Researchers can use this information to analyze the frequency of different types of breaches over time. They could extrapolate the risk of insiders versus employees who make…
Module 2 Journal Entry
Explain how the principles of science relate to cybersecurity Relativism provides that all things are related. Cybersecurity is included in pretty much all work nowadays because most use technology. Objectivity means studying topics in a value-free way. Cybersecurity has many ethical issues when it comes to dealing with cybercrime that shouldn’t be dictated by opinions….
Module 1 Journal Entry
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.https://niccs.cisa.gov/workforce-development/nice-framework These areas seem very specialized so you would want to focus on only a few. One that popped out to me was…
A job listing and some requirements and skills
Link to job listing: https://rb.wd5.myworkdayjobs.com/en-US/FRS/job/Kansas-City-MO/Information-Security-Engineer_R-0000007896-1 I found a position called ‘Information Security Engineer’ from the Federal Reserve. The job listing includes key activities and qualifications. The requirement of a Bachelor’s degree is very broad by requiring something STEM or closely related from an accredited college or university, or equivalent related education and/or experience. I’m fairly…
Finding Cybersecurity Everywhere Fortune 500
Group Member Names: Carlos Carey, Carson Viscusi, and Ian HagmannCompany Name: PepsiCoCompany Industry: Food and Beverage CompanyCompany Main Product/Service: To provide food and beverages to customers across the globe.Company Primary Customers: Global, wholesale, and all places where snacks are sold.Why Does This Company need Cybersecurity? To protect their trade secrets and networks for factories and…
CyberOps 2022 Reflection
I had a great time at the CTF and conference. I didn’t know what to expect with the conference part as I haven’t really looked into what a conference is. The CTF was a little different from what I was expecting, I guess I’ve only done more teaching focused ones like picoCTF. There was a…
Discussion Board – Protecting Availability
Instructions: In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? In order to protect availability, the first step I would take is to get a lay of the land. I would look at what the network looks like, what…