Journal Entry 8

Assignment Description: “Watch this video and pay attention to the way that movies distort hackers.Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?“ I think media depictions on hacking and cybersecurity have a negative impact on thepublic perception of cybersecurity by overcomplicating the technology. For example, the James Bond clip…

Journal Entry 7

Assignment Description: “Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).” Meme 1:This image is about the optimism bias effect people have in online spaces, assuming that they themselves are not at risk or a profitable…

Journal Entry 6

Assignment Description: “Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.” Fake Example 1: bedbathclose .com This website…

Journal Entry 4

Assignment Description: “Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.” Maslow’s first stage, physiological, has become much easier to access with moderntechnology. Food delivery services like UberEats or Grubhub have made it easier…

Journal 5

Assignment Description: “Review the articles linked with each individual motive in the presentation page… Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.” #1: Multiple Reasons makes the…

Journal 3

Cybersecurity researchers could use the information on PrivacyRights.org to study databreaches by looking through the website’s archive of past breaches, company responses tobreaches, and legal responses to breaches. The website would be a major assisting tool in databreach research because the information is already filtered and sorted in many ways. Informationlike the types of breaches,…

Journal 2

The principles of science relate to cybersecurity by making sure research and policyin the field is accurate and ethical. While cybersecurity is not researching a “hardscience,” it is still connected to studies on the behaviors of hackers, employees, and theusage of technology to monitor and gather data on individuals. Parsimony, empiricism,skepticism, and relativism all ensure…

Journal 1

Reading through the NICE Workforce Framework, the area I am most interested in is Design and Development. Specifically, I am interested in the development, assessment, and testing career fields under it, as I find the software and coding sides of cybersecurity the most enjoyable and would like to pursue a side of the field more…