For money #1: I believe that most cyber-criminals do these crimes to make money, hackers feel like it is easier this way rather than getting a job. They might think that they could make more money hacking than being paid… Continue Reading →
Article 1 In this article, news articles and databases were reviewed reporting cyber-incidents, cybercrimes, hacks and other attacks. During the research, various types of harm was identified and a taxonomy of cyber-harms encountered by organizations was created. This taxonomy consist… Continue Reading →
Physiological needs: If I am out at a concert but not familiar with the area, and my phone loses connection it would cause me to panic. If I don’t have phone connection, how will I be able to know my… Continue Reading →
Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. I chose to major in cybersecurity because a career in cybersecurity can go in… Continue Reading →
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. A data breach is when an unauthorized individual violates confidential databy viewing, copying, stealing, or transmitting… Continue Reading →
Explain how the principles of science relate to cybersecurity. Science relate to cybersecurity as researchers apply known facts and scientific discoveries to create useful ways to hinder cyberattacks or cyber threats. Social cybersecurity science was created to characterize, understand, and… Continue Reading →
I am interested in cybersecurity technology because I want to help protect peoples’ livelihoods and privacy. Technology is constantly evolving causing new attacks and threats that need to be discovered and properly handled. There are many untrustworthy people in the… Continue Reading →
This is a post. Use posts to update your blog.
© 2025 jgilb010 — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑