This happened to my mother and my aunt, because my mother trusted her sister with her phone because her sister is a part of her human firewall, but my aunt discovered my mom’s face ID would let her in, and she used it to order uber eats. This is an example of information that is…
Author: jrice025
Please do not go to any of these websites.
Some websites that are not the original and or fake that I found would be Branchspot.com instead of firstlightfcu.org, Free Vbucks2022.online, and reservations.com. Branchspot says that it’s FirstLight FCU in the description and title but the web address is clearly fake, it is an outlier among the actual the URLs where the official site is…
Journal Entry 5 Motives behind cybersecurity ranked from most to least likely.
1. For money: I think this would be The most likely among all the choices, in the same way burglars and robbers are looking to make money, its most likely easier and safer depending on how they do it. 2. multiple reasons: Out of boredom comes the want of entertainment, some people might decide to…
CYSE 201S Journal Entry 4
Jonathan Rice Malow’s Hierarchy of needs and how it can relate to my experiences with technology. To begin let’s start from the bottom, Phycological needs: For some people including myself we see technology as a form of rest, after finishing the day some of us turn on our televisions to watch something or play something…
Cybersecurity statistics and research
Jonathan Rice – Journal 3 After viewing the information available at PrivacyRights.org I have some ideas about how researchers might use this information to study security and data breaches. From the last few years, there are more than 143 million people whose records were impacted by data breaches in America. The information about the type…
How cybersecurity relates to principles of science
Jonathan Rice Week 2 – Journal 2 The principles of science can be applied to cybersecurity. The scientific method says that in order for something to be taken into understanding or acceptance, it must be logical, confirmable, repeatable, and scrutinized by peers or colleagues. It must be able to be described, explored, or explained…
NICE Workforce Framework.
This is a fascinating field. The most interesting areas to focus on would definitely be Provisioning where the Research and Development prototypes are made because dreaming up a concept and then making that concept a reality that works and operates in a way that is successful would be amazing. Protect and Defend also sounds like…