There are several ways to identify fake websites and distinguish them from real websites: Check the website’s URL: Fake websites often have URLs that are slightly different from the real website’s URL, such as using a different domain or subdomain. For example, a fake website for a well-known retailer may have a URL that looks…
Author: jbrah001
Journal Entry #4
Maslow’s Hierarchy of Needs is a psychological theory that describes the various levels of human needs and how they motivate behavior. The levels of need, in order from the most basic to the most complex, are physiological, safety, love and belonging, esteem, and self-actualization. In terms of my experiences with technology, I can see how…
Journal Entry #3
The data on PrivacyRights.org could be used by researchers in a variety of ways to examine data breaches. To find trends and patterns, they can examine the different breaches that have happened and the most affected industries, for instance. This could aid academics in understanding the most frequent reasons for breaches as well as the…
Principles of science relation to cybersecurity
The principles of science are guidelines that all scientists follow when doing any type of research or experimentation. This is also applicable to cybersecurity specialists who have their own rules and conducts that they follow in order to maintain and execute their job efficiently. This is identified as the framework that specialists use, and framework…
NICE Workforce Framework
In the NICE Workforce Framework for Cybersecurity there are seven different categories each with their own specialty areas. In this paragraph however I am only going to focus on the two that most intrigue me and the two that seem less interesting (as of right now in my career). One that I am interested in…
How we should approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge
Cyber policy is very important because when putting a cyber policy in place the goal is to create a safer cyber web for people to use. That’s why taking in information day by day when developing cyber policies are important because it is impossible to predict the future of the cyber world since it is…
How cyber technology impacts interactions between offenders and victims
Crimes can vary from Cyber harassment, fraud, digital piracy, sex crimes, and the worst of all, Cyberwar. Cyber-harassment is an unjustifiable crime that has been committed. Victims involved can be very traumatized psychologically. This issue is a huge crime in my eyes as someone is being harassed through the computer screen and can lead to…
The overlap between criminal justice and cybercrime, and how it relates to other disciplines
There are multiple ways in which criminal justice and cybercrime can overlap. If someone commits a crime, they are breaking the law which will result in the pursuit of legal action from state or federal authorities. It is important for investigators to look at the human factors in why cyber criminals chose to do what…
How engineers make cyber networks safer
Cyber security networks can always be improved in order for maximum safety for the user. Creating new cyber networks is extremely important because it makes it harder for hackers to gain access into a system if they aren’t familiar with it. Engineers create cyber networks and are constantly looking to improve them. Cyber networks often…
3 ways that computer have made the world safer and less safe
Computers and technology have improved our ways of communication. Our technology is advancing has led us to many new forms of electronic communication, social networking, voicemails, emails, and even video conferences. Also beneficial for our relationships, education purposes, and businesses. Communication is key to keeping relationships alive. Communication is a big part. They allow people…