Journal Entry #8

After watching the video, I realized that movies often give people the wrong idea about what hackers and cybersecurity really look like. In movies, hackers are usually shown typing super fast in dark rooms, breaking into government systems in seconds, and doing things that aren’t realistic. This can make cybersecurity seem like it’s only for…

Journal Entry #4

There are many ways that I can relate Maslow’s hierarchy of needs to my own personal experiences with technology. The first need is psychological needs. In today’s word, technology is essential in life. Phone calls especially are essential as you can be in a position where you may need to call for help while no…

Journal Entry #3

The website PrivacyRights.org features a lot of useful information on data breaches. Some of this information includes the total number of individuals impacted by data breaches, and the amount of individuals affected by one single data breach from only 21 days ago, which was over one million. There are also mappings of where these data…

Journal Entry #2

There are several ways the principles of science relate to cybersecurity. First, empiricism plays a big role because cybersecurity experts rely on real data and evidence when investigating threats or breaches. They can’t just guess—they need facts. Determinism is also important because it assumes every cyber event has a cause, like a certain weakness in…

Journal Entry #1

After reviewing the NICE Workforce Framework, I found that the area that appeals to me the most is “Protect and Defend.” I enjoy the idea of stopping threats and protecting systems before damage is done. Roles like Cyber Defense Analyst or Incident Responder really interest me because they deal with detecting attacks and acting fast…

ePortfolio entry #13

It is the “short arm” of predictive knowledge that presents a barrier when developing cyber-policy and infrastructure. This idea refers to how hard it can be to foresee future technological advancements and cyberthreats, which can make it impossible to create infrastructure and regulations that work. First and foremost, developing cyber-policy requires a proactive and flexible…

ePortfolio entry #12

The way that criminals and victims interact has been profoundly altered by cyber technology, changing the nature of crime and victimization in the digital age. The rise in cyber-enabled crimes, which can happen across great geographic distances and frequently involve anonymous offenders, is one prominent effect. Cybercriminals can target victims through a variety of digital…