Journal 4

From the lower part is the physiological needs. In this level, the layer contains the essential parts to survive and gain access to technology. In this layer, my smartphone and laptop are related to my physiological needs. In order to get food, I may order takeout or use my smartphone to make a digital payment…

Journal 3

Researchers can use the information to study breaches. The important part is tracing the year that the breach occurred and correlate the recent attacks. By knowing similar occurrences, the researchers can predict the manipulation of the attacks. Another important part is the summarization of the breaches. Knowing the details that goes behind the breach can…

Journal 2

There are seven principles of science. They are relativism, objectivity, parsimony, objectivity, skepticism, ethical neutrality, and determinism. Relativism can be applied to cybersecurity by the relation of different concepts. For example, the cause of climate change can be attributed to the rise in technology and the destruction of trees to modernize our society. The intention…

Journal 1

I like the analyze, investigate, and protect and defend. I don’t like collect and operate, securely provision, and oversee and govern. The analyze option is awesome because collecting information is important to secure a system. For example, if someone sees high traffic on a website, he/she may take precautions to redirect or stop users from…