Journal entry 8

I think that the media influences the understanding of cybersecurity as its a complex thing that requires you to be super intelligent. In movies like James Bond, shown in the video, Hollywood shows it as a 3D space with a lot of moving parts and its really complex, however this is not really how it…

Journal entry 6

Spotting fake websites can be hard, a few examples of fake websites could be fake bank websites, fake shopping websites, and fake health info. Fake bank websites miss the HTTPS encryption which makes them insecure and the likelihood of viruses getting onto your computer or phone. With a fake shopping website, they usually have prices…

Journal entry 5

In my opinion, the ranking of the 7 motives for cybercrime goes as follows: financial gain, economic espionage, political reasons, revenge, reputation, thrill, and personal gratification. Financial gain is the most widespread motive for cybercrime, as it’s motivated by money, one of the most important resources in the world. Economic espionage. Companies and even governments…

Week 4 Journal entry

Physiological needs can be broken down into basic needs like food and water. An online example of this would be food delivery services and online grocery store apps. A personal experience I’ve had would be using grubhub to pre-order food so when I get out of class I go get it. Safety needs in relation…

Week 3 journal entry

Researchers can use publicly available information on data breaches to study them in several ways. Some of these ways include, Trend analysis, impact assessments, comparative studies, and policy development. Researchers use trend analysis to look at the frequency and types of breaches that happen over time, they can identify trends and use impact assessment to…

Week 2 journal entry

There are a few examples of scientific principles that relate or are related to cybersecurity. For example empirical evidence and testing, cyber relies on data and experiments such as penetration testing and incident analysis to identify vulnerabilities in a network. Another example is repetitive testing similar to the scientific method, cybersecurity has a systematic approach…

Week 1 journal entry

There are a couple things from the NICE framework that interest me as careers, implementation and operation(IO) and protection and defense(PD). I believe that IO would be a good place for me to work in because some of the jobs require some hands-on work, such as network operations where I would have to plan network…