Journal entry 8

I think that the media influences the understanding of cybersecurity as its a complex thing that requires you to be super intelligent. In movies like James Bond, shown in the video, Hollywood shows it as a 3D space with a lot of moving parts and its really complex, however this is not really how it…

Journal entry 6

Spotting fake websites can be hard, a few examples of fake websites could be fake bank websites, fake shopping websites, and fake health info. Fake bank websites miss the HTTPS encryption which makes them insecure and the likelihood of viruses getting onto your computer or phone. With a fake shopping website, they usually have prices…

Journal entry 5

In my opinion, the ranking of the 7 motives for cybercrime goes as follows: financial gain, economic espionage, political reasons, revenge, reputation, thrill, and personal gratification. Financial gain is the most widespread motive for cybercrime, as it’s motivated by money, one of the most important resources in the world. Economic espionage. Companies and even governments…

Week 4 Journal entry

Physiological needs can be broken down into basic needs like food and water. An online example of this would be food delivery services and online grocery store apps. A personal experience I’ve had would be using grubhub to pre-order food so when I get out of class I go get it. Safety needs in relation…

Week 3 journal entry

Researchers can use publicly available information on data breaches to study them in several ways. Some of these ways include, Trend analysis, impact assessments, comparative studies, and policy development. Researchers use trend analysis to look at the frequency and types of breaches that happen over time, they can identify trends and use impact assessment to…

Week 2 journal entry

There are a few examples of scientific principles that relate or are related to cybersecurity. For example empirical evidence and testing, cyber relies on data and experiments such as penetration testing and incident analysis to identify vulnerabilities in a network. Another example is repetitive testing similar to the scientific method, cybersecurity has a systematic approach…

Week 1 journal entry

There are a couple things from the NICE framework that interest me as careers, implementation and operation(IO) and protection and defense(PD). I believe that IO would be a good place for me to work in because some of the jobs require some hands-on work, such as network operations where I would have to plan network…

Entry 13

Given the “short arm” of predictive knowledge, characterized by the rapid pace of technological advancements and the unpredictable nature of future cyber threats, it’s imperative to adopt an adaptive and proactive approach to the development of cyber-policy and infrastructure. This necessitates the establishment of agile policy frameworks that can evolve alongside emerging threats and technological…

ePortfolio entry 12

Overall, the impact of cyber technology on interactions between offenders and victims is complex and multifaceted, with both positive and negative implications for individuals’ safety, well-being, and relationships in the digital age. It underscores the importance of promoting responsible online behavior, educating users about cybersecurity risks, and implementing effective strategies to prevent and respond to…

Entry 11

The overlap between criminal justice and cybercrime is significant and multifaceted. Here’s how they intersect: The overlap between criminal justice and cybercrime relates to other disciplines discussed in this class, such as: