Meme 1: This meme relates to Human Systems Integration because it’s referring to how employees should be trained to be careful with all emails, especially those that are automatically categorized as spam. Meme 2: This image demonstrates how people should be aware of fake websites that attempt to imitate the real version of a website…
Tag: CYSE 201S
Fake Website Examples
Fake USPS Website Source: Trend Micro News What makes this fake website tricky is the fact that the attacker has added SSL encryption in order to add the “padlock” symbol. However, this USPS Tracking number website is fake because the URL does not match the one on the real website (https://tools.usps.com/go/TrackConfirmAction_input). Additionally, this source mentioned…
Article Review of “Privacy threats in intimate relationships”
“Privacy threats in intimate relationships,” written by Karen Levy and Bruce Schneier, and published in the Journal of Cybersecurity in May of 2020, presents the results of their study on the relationships between intimate threats and their implications on technical privacy design and policy. The main research questions this article seeks to answer are how…
Maslow’s Hierarchy of Needs & Its Relation to Technology
I think it’s safe to say that Maslow’s theory is still relevant today in multiple ways. It works by covering the needs of humans, from basic survival at the bottom layer, to improving one’s emotional and mental well-being. Similarly, modern technology has seemingly become a physiological need, one that would align with the very bottom…
PrivacyRights.org
Privacy Rights Clearinghouse has provided a wealth of information regarding data privacy. This includes a database that displays the protection status of various types of Personally Identifiable Information (PII) in each state. Types of PII can include paper records, biometric information, medical information, passports, deidentified information, and encrypted information. Their website also contains a resource…
NICE Framework
The NICE Framework has a wealth of information about the various types of cybersecurity work, which applies across the public, private, and academic sectors. Topics are divided into seven categories, with a combined total of thirty three specialty areas. The majority of the speciality areas that I’m currently interested in are classified under the ‘Operate…
09/10/2023 Journal Entry – Cybersecurity and Scientific Principles
The study of cybersecurity can be enhanced by adhering to the scientific principles of determinism, ethical neutrality, empiricism, parsimony, objectivity, and relativism. Relativism can help cybersecurity professionals understand how things are related, such as when a change in one system can result in changes occurring in other systems, too. There are a variety of examples…