Assignment Description: “Watch this video and pay attention to the way that movies distort hackers.Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?“ I think media depictions on hacking and cybersecurity have a negative impact on thepublic perception of cybersecurity by overcomplicating the technology. For example, the James Bond clip…
Journal Entry 7
Assignment Description: “Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).” Meme 1:This image is about the optimism bias effect people have in online spaces, assuming that they themselves are not at risk or a profitable…
Journal Entry 6
Assignment Description: “Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.” Fake Example 1: bedbathclose .com This website…
Journal Entry 4
Assignment Description: “Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.” Maslow’s first stage, physiological, has become much easier to access with moderntechnology. Food delivery services like UberEats or Grubhub have made it easier…
Write-Up on SCADA Systems
Assignment Description: “This write-up you will use the SCADA Systems (SCADA Systems, 2024) article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. This write-up is to be IN YOUR OWN WORDS, and must reference the aforementioned article, and at…
The Human Factor in CyberSecurity
Assignment Description: “During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats. Now, put on your Chief Information Security Officer hat. Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is, how…
Journal 5
Assignment Description: “Review the articles linked with each individual motive in the presentation page… Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.” #1: Multiple Reasons makes the…
The CIA Triad
The CIA Triad is a cybersecurity model that helps organizations focus on the fundamentals of confidentiality, integrity, and availability. Each principle is important to keep the flow of information secure yet fast. Confidentiality limits who can see the data, integrity protects the data itself, and availability keeps data quick. Confidentiality Confidentiality is about determining what…
Journal | AI Assignment on Cybersecurity in an Organization
ChatGPT Output: Analysis of Potential Locations for Cybersecurity Department As your organization begins to establish a cybersecurity program, the decision of where to place this new department within the organizational structure is critical. The positioning of the cybersecurity function can significantly impact its effectiveness, authority, and alignment with overall business objectives. Below is an analysis…
Journal 3
Cybersecurity researchers could use the information on PrivacyRights.org to study databreaches by looking through the website’s archive of past breaches, company responses tobreaches, and legal responses to breaches. The website would be a major assisting tool in databreach research because the information is already filtered and sorted in many ways. Informationlike the types of breaches,…