The routine theory believes that crime occurs when 3 activities happen at the same time. The 3 activities are motivated offenders, suitable targets, and the absence of capable guardians. This video explains that one family fell victim to an online… Continue Reading →
I believe some may not report is that they do not know how to go about reporting. Before exploring the world of cybersecurity I used to think “Well what would the police even do?” and I believe others will think… Continue Reading →
The best way to view cybersecurity from an economic point of view is through a cost-benefit analysis. This analysis can help businesses or organizations determine the best way to reduce the risk of cyber incidents and spending costs. Budgets can… Continue Reading →
In Module 3 PowerPoint there were 2 common experiment questions. • Do certain interventions increase security behaviors by computer users?• Do certain characteristics of individuals increase the likelihood of unsafe practiceswhen using technology?
This video shocked me for many reasons. One reason is that a 12-year-old was able to manipulate a bear meant to connect family and turned malicious. Module 6 in classes briefly discussed trust with the web and this elaborates on… Continue Reading →
I love how he explained this topic and showed just how easy it can be. He has a great point that humans can be the greatest weakness. People talk to strangers they find things to relate to others. Whether this… Continue Reading →
I believe that cognitive theories are most closely related to cybercrime. People who rob banks do need the money and most do not tend to hurt people in some theories it is that they believe the bank has money and… Continue Reading →
Cyber victimization happens very commonly in today’s day and age. Recently, there has been a spike where many people “hype” up someone in the media and praise them, but then suddenly something is done that turns the users away. In… Continue Reading →
Clarifying information: Definition: Computer hacking is broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. Various state and federal laws govern computer hacking. The federal Computer Fraud and Abuse Act provides details as follows: definitions.uslegal.com/c/computer-hacking/ From… Continue Reading →
One of the careers that I would consider is an ethical hacker/ penetration tester. Using my skills for good and understanding an attacker’s motives would be beneficial and intrigue me. Computer Forensics analysis is another field at the top of… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑