The media portrays cybersecurity in an exaggerated way. In many modern movies, the depiction of cybersecurity is based on more fictional ideas rather than how it actually goes down in reality. One way that this can affect the general publics understanding of cybersecurity and hacking is by the way that hackers are presented. In many…
CYSE201S Week 6 Journal Entry
One way that you generally tell if a website is a fake is by looking at the spelling and grammar. If there are multiple mistakes then it is mostly that the site is not trustworthy. Another way to spot a fake website is by paying attention to the url. For example, if you are looking…
CYSE 201S Week 5 Journal Entry
I personally would rank money as the motive that makes the most sense. Some people end up in positions where they have to do what they need to do to survive and that is the most justifiable motive in my opinion. Next, would be multiple reasons. The article talks about how many hackers are so…
CYSE201S Article Review #1
Joshua Evans Professor Aslan CYSE 201S 2/11/24 Article Review #1: Cybercrime Laws in Iraq Introduction The article under review, titled “Cybercrime Laws in Iraq: Addressing Limitations for Effective Governance”, looks at the general policies in place within Iraq under a lens, with the goal of providing effective solutions to the current ineffective governance. The article…
CYSE 201S Week 4 Journal Entry
The first level of Maslow’s Hierarchy of Needs, physiological needs, can relate to technology because technology and devices such as smartphones have become almost essential to that way that we as humans live our lives. The next section, safety needs, relates to technology due to security methods that take advantage of technology such as cameras…
CYSE 201S Week 3 Journal Entry
PrivacyRIghts.org shows much information on general data breaches such as a chronological list of recorded data breaches, resources on how to prevent such breaches, along with news articles that talk about breaches in detail. Public information such as this can help researchers to look at similar trends and patterns within data breaches to help determine…
CYSE 201S Week 2 Journal Entry
The principles of science relate to cybersecurity in many ways. relativism can be used to understand that every small action within a cybersecurity landscape can have an adverse effect throughout. objectivity ensures that there is no bias in cybersecurity analysis. Parsimony keeps cybersecurity explanations simple and easy to understand for all. Empiricism makes sure that…
CYSE 201S Week 1 Journal Entry
Personally, I would want to focus my career on analyzing, protecting and defending, and oversee and govern. I feel that these areas seem more straightforward compared to the rest. Especially analyzing seems interesting to me, as I feel it would be the most likely to fit my strengths. The one that is least appealing to…