Journal Entry #6

There are several ways to identify fake websites and distinguish them from real websites: Check the website’s URL: Fake websites often have URLs that are slightly different from the real website’s URL, such as using a different domain or subdomain. For example, a fake website for a well-known retailer may have a URL that looks…

Journal Entry #4

Maslow’s Hierarchy of Needs is a psychological theory that describes the various levels of human needs and how they motivate behavior. The levels of need, in order from the most basic to the most complex, are physiological, safety, love and belonging, esteem, and self-actualization. In terms of my experiences with technology, I can see how…

Journal Entry #3

The data on PrivacyRights.org could be used by researchers in a variety of ways to examine data breaches. To find trends and patterns, they can examine the different breaches that have happened and the most affected industries, for instance. This could aid academics in understanding the most frequent reasons for breaches as well as the…

Principles of science relation to cybersecurity

The principles of science are guidelines that all scientists follow when doing any type of research or experimentation. This is also applicable to cybersecurity specialists who have their own rules and conducts that they follow in order to maintain and execute their job efficiently. This is identified as the framework that specialists use, and framework…

NICE Workforce Framework

In the NICE Workforce Framework for Cybersecurity there are seven different categories each with their own specialty areas. In this paragraph however I am only going to focus on the two that most intrigue me and the two that seem less interesting (as of right now in my career). One that I am interested in…

How cyber technology impacts interactions between offenders and victims

Crimes can vary from Cyber harassment, fraud, digital piracy, sex crimes, and the worst of all, Cyberwar. Cyber-harassment is an unjustifiable crime that has been committed.  Victims involved can be very traumatized psychologically. This issue is a huge crime in my eyes as someone is being harassed through the computer screen and can lead to…

How engineers make cyber networks safer

Cyber security networks can always be improved in order for maximum safety for the user. Creating new cyber networks is extremely important because it makes it harder for hackers to gain access into a system if they aren’t familiar with it. Engineers create cyber networks and are constantly looking to improve them. Cyber networks often…

3 ways that computer have made the world safer and less safe

Computers and technology have improved our ways of communication. Our technology is advancing has led us to many new forms of electronic communication, social networking, voicemails, emails, and even video conferences. Also beneficial for our relationships, education purposes, and businesses. Communication is key to keeping relationships alive. Communication is a big part. They allow people…