{"id":133,"date":"2022-01-28T21:07:30","date_gmt":"2022-01-28T21:07:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2022-05-03T01:05:17","modified_gmt":"2022-05-03T01:05:17","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1>Journals \u00a0<\/h1>\n<h2>1. NICE Workforce Framework\u00a0<\/h2>\n<p><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"1\" data-page-index=\"0\">As of right now, I am still uncertain of which career path I want to take through the <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"2\" data-page-index=\"0\">cybersecurity field. But I am fairly certain that I want to do something protecting others from <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"3\" data-page-index=\"0\">cyber related crimes and etc. Given this, I believe the protect and defend section of the NICE <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"4\" data-page-index=\"0\">Workforce Framework would be of most use to me. This section would provide me information in<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"5\" data-page-index=\"0\">how to identify and analyze threats to IT systems\/networks. Another section I believe I would use <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"6\" data-page-index=\"0\">is the securely provision section. One part this section would help me do is build secure IT <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"7\" data-page-index=\"0\">systems which I think would be very interesting. <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"8\" data-page-index=\"0\">The section that would appeal to me the least would have to be the oversee and govern <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"9\" data-page-index=\"0\">section. This section deals with leadership, management, and direction but it\u2019s not something I <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"10\" data-page-index=\"0\">see myself doing. This is really the only section that I\u2019m not appealed to; although I think it would <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"11\" data-page-index=\"0\">still be good to learn. <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"12\" data-page-index=\"0\">The other section like analyze and investigate also seem interesting but I don\u2019t think they <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"13\" data-page-index=\"0\">focus on what I want to do; creating ways to defend against cyber related attacks.<\/span><\/span><\/p>\n<h2>2. Principle of Science Relation to Cybersecurity\u00a0<\/h2>\n<p><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"1\" data-page-index=\"0\">The argument that the principles of science can relate to cybersecurity can be brought back to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"2\" data-page-index=\"0\">Robert Bierstedt. He suggested that the social sciences adhere to the same principles as the <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"3\" data-page-index=\"0\">natural science therefore implying these principles can be applied to cybersecurity. These <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"4\" data-page-index=\"0\">scientific principles include relativism, objectivity, parsimony, empiricism, ethical neutrality, and <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"5\" data-page-index=\"0\">determinism. The principle of relativism is simply meaning that all things are related. This can be <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"6\" data-page-index=\"0\">applied to cybersecurity through a systems viewpoint by noting a change in one system leads to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"7\" data-page-index=\"0\">changes in another. Some of these systems that are affected by cybersecurity are the social <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"8\" data-page-index=\"0\">system, educational system, and political system to just name a few. Objectivity relates to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"9\" data-page-index=\"0\">cybersecurity by stating how scientist should study topics in a \u201cvalue-free\u201d manner. Social <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"10\" data-page-index=\"0\">scientist might have strong opinions on certain topics but shouldn\u2019t let that affect the shape of <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"11\" data-page-index=\"0\">their research. Parsimony is the principle that scientist should keep their explanation as simple as <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"12\" data-page-index=\"0\">possible. This is so others will be able to understand the explanation and that it can be tested by <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"13\" data-page-index=\"0\">others as well. Empiricism implies that social scientist should only study behavior which is real to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"14\" data-page-index=\"0\">our senses. In doing so, this leads us to not rely on opinions\/hunches to conform our <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"15\" data-page-index=\"0\">comprehension of cybersecurity. Ethical Neutrality is the principle stating that scientist have to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"16\" data-page-index=\"0\">adhere to ethical standards when conducting research. \u201cDoes limiting internet access to certain <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"17\" data-page-index=\"0\">communities reduce cybercrime?\u201d is just one of the many examples a social scientist might have <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"18\" data-page-index=\"0\">to address containing underlying ethical implications. Determinism states that behavior is caused,<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"19\" data-page-index=\"0\">determined, or influenced by a preceding event. The models of explanation within a determinism <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"20\" data-page-index=\"0\">framework are the nomothetic model and the idiographic model. The nomothetic model <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"21\" data-page-index=\"0\">identifies the relatively few causes of a behavior while the idiographic model identifies the <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"22\" data-page-index=\"0\">multiple causes over times of a behavior. <\/span><\/span><\/p>\n<h2>3. Maslow\u2019s\u00a0Hierrachy\u00a0of Needs<\/h2>\n<div class=\"PSPDFKit-Spread\" data-spread-index=\"0\">\n<section class=\"PSPDFKit-Page PSPDFKit-Page-Rotation-0-degree PSPDFKit-5n4p2xw22yc7wfzum66h4dvppd PSPDFKit-5xupdwena6uabmu9kpv3mqfdwz\" data-page-index=\"0\" data-page-is-loaded=\"true\">\n<div class=\"PSPDFKit-7gjegpzk7znma7erwdvdza5ypz\">\n<div class=\"PSPDFKit-56n1nqnnrb1vp96tz5hfxdeh29\" role=\"text\"><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"1\" data-page-index=\"0\">Maslow\u2019s Hierarchy of Needs suggests that all humans have needs which exist on a <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"2\" data-page-index=\"0\">hierarchy. Is this theory, Maslow determined that as the lower levels needs are met, we begin to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"3\" data-page-index=\"0\">focus on trying to meet our upper level needs. The central to this belief is that our behavior is <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"4\" data-page-index=\"0\">determined by our needs which can change over time, depending on which level we are on. <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"5\" data-page-index=\"0\">Maslow stated that all individuals strive to reach self-actualization, the highest of the level, though <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"6\" data-page-index=\"0\">few ever actually meet it. The hierarchy has three main parts: basic needs, psychological needs, <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"7\" data-page-index=\"0\">and self-fulfillment needs. Basic needs can be broken down into the lowest level being <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"8\" data-page-index=\"0\">physiological needs and then the next level, being safety needs. Psychological needs include <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"9\" data-page-index=\"0\">belongingness and love needs, which is right above safety needs, and esteem needs above it. The <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"10\" data-page-index=\"0\">final part is self-fulfillment needs, which only evolves self-actualization. We can relate experiences<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"11\" data-page-index=\"0\">with technology to each of these levels. <\/span><\/span><\/div>\n<div class=\"PSPDFKit-56n1nqnnrb1vp96tz5hfxdeh29\" role=\"text\"><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"12\" data-page-index=\"0\">The hierarchy begins with our physiological needs which include food, water, warmth, rest,<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"13\" data-page-index=\"0\">etc. Technology can be applied to this level by using an example of Door dash. People use this app <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"14\" data-page-index=\"0\">to get food or other necessities. I can personally apply technology to this level because I use music <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"15\" data-page-index=\"0\">to help me sleep. The next level, but still in the basic needs, is safety needs which is about security <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"16\" data-page-index=\"0\">and safety. We use technology is this section through things like cameras and alarm systems. <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"17\" data-page-index=\"0\">The next level in the hierarchy is belongingness and love needs. This level is talking about <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"18\" data-page-index=\"0\">intimate relationships and friends. On the intimate relationship section, some people use tinder and <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"19\" data-page-index=\"0\">apps like such to find partners. But on the friends\u2019 sections we use our phones to stay in touch with<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"20\" data-page-index=\"0\">others by texting, calling, facetiming, etc. Next, we have the esteem needs section which is prestige<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"21\" data-page-index=\"0\">and the feeling of accomplishment. On this level, people use apps like Instagram so they can get <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"22\" data-page-index=\"0\">likes and followers to feel accomplished. <\/span><\/span><\/div>\n<div><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\" style=\"color: initial\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"1\" data-page-index=\"1\">On the final level we have self-actualization. This level is about people achieving their full <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\" style=\"color: initial\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"2\" data-page-index=\"1\">potential, including creative activities. Technology can be applied to this level through things like <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\" style=\"color: initial\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"3\" data-page-index=\"1\">Lumosity. In this, they have brain games in improve problem solving skills, memory, attention, <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\" style=\"color: initial\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"4\" data-page-index=\"1\">etc.<\/span><\/span><\/div>\n<h2>4. Motives for Cybercrime\u00a0<\/h2>\n<p><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"1\" data-page-index=\"0\">Why exactly do criminals commit the crimes they do? This is because each of them have <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"2\" data-page-index=\"0\">their own motives. These motives include for entertainment, political reasons, for revenge, out of<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"3\" data-page-index=\"0\">boredom, for recognition, for money, or they have multiple reasons. People can put these <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"4\" data-page-index=\"0\">motives in any kind of order of importance, but today I will explain which I think make the most <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"5\" data-page-index=\"0\">to least sense. I would put for multiple reasons at the top of the list. This is because this could <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"6\" data-page-index=\"0\">include any of the reason below; for example, the committed the crime for money and revenge. <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"7\" data-page-index=\"0\">And, because most of the time, people don\u2019t do things for only one reason. All the choices we <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"8\" data-page-index=\"0\">make are backed up by multiple reasons. The next motive I would put the makes the most sense <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"9\" data-page-index=\"0\">is for money. Whenever I see a company gets hacked, the criminals want millions of dollars if the <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"10\" data-page-index=\"0\">company wants their info back. If somebody had the ability to gain millions over one \u201cjob\u201d they <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"11\" data-page-index=\"0\">would jump on that opportunity. Next on my list is revenge. It\u2019s hard to forgive people but it\u2019s <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"12\" data-page-index=\"0\">easy to get revenge. From the mind of a criminal, if I could hack somebody\u2019s phone that wronged <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"13\" data-page-index=\"0\">me to make their life that much harder I would. Next, I would put for political reasons. I <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"14\" data-page-index=\"0\">personally don\u2019t talk about politics that much, but I know people that are into politics, are really <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"15\" data-page-index=\"0\">into politics. They would take any opportunity to help their side out. Now down to the reasons I <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"16\" data-page-index=\"0\">feel that don\u2019t make much sense, these can kind of get interchanged. Entertainment I feel doesn\u2019t<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"17\" data-page-index=\"0\">make much sense is because I feel as if there are a lot of better ways to \u201chave fun\u201d than to try to <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"18\" data-page-index=\"0\">hack someone. Plus, this would take a lot of time and effort to pull off. This is also why I feel like <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"19\" data-page-index=\"0\">boredom doesn\u2019t make sense. If they are bored, they could do things that require a lot less effort,<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"20\" data-page-index=\"0\">time, and even money. And for the final reason I feel that makes no sense is for recognition. I <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"21\" data-page-index=\"0\">personally don\u2019t here much about hacking or such that happen, but that could also be that I don\u2019t<\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"22\" data-page-index=\"0\">really watch the news. Even so I still find out about things going on around the world, but hacking <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"23\" data-page-index=\"0\">isn\u2019t one of them. Any of these motives can be changed depending on someone\u2019s situation but <\/span><\/span><span class=\"PSPDFKit-6sac9jfr3tkfj891p6bzuaurjz PSPDFKit-7ueugkc3n8r9d1x6ve8eyrzr1e PSPDFKit-7r92wqbyrypf78kb6d9dentg6f PSPDFKit-Text\"><span class=\"PSPDFKit-8eut5gztkfn71zukw49x824t2\" data-textline-id=\"24\" data-page-index=\"0\">this is just what I personally think makes the most sense.<\/span><\/span><\/p>\n<p>\u00a0<\/p>\n<h1>Career Professional Paper<\/h1>\n<p>The career I chose to do my career professional paper on is an information security consultant. An information security consultant, also sometimes called a security analyst, pinpoints vulnerabilities in computer systems, networks, and software programs and works toward solutions to strengthen them against hackers (WGU).<\/p>\n<p><u>Requirements<\/u><\/p>\n<p>\u00a0In order to even get your foot in the door for this job you need to get a bachelor\u2019s degree in cybersecurity. And then getting a master\u2019s degree could open even more doors throughout this career. Along with getting the bachelor\u2019s degree, and master\u2019s degree if you choose to do so, there are some certificates your specific job might require you to have. Some of these certificates are CEH: Certified Ethical Hacker, CISM: Certified Information Security Manager, CompTIA Security+, CISSP: Certified Information Systems Security Professional, and GSEC: SANS GIAC Security Essentials (Field Engineer).<\/p>\n<p>You also have a lot of other requirements in order to enter this career. Some of these other requirements include excellent technical skills for building security architecture, strong computer coding and endpoint security skills, communication skills, high analytical skills, organizational skills, and decision-making skills (Betterteam).<\/p>\n<p><u>\u00a0<\/u><\/p>\n<p><u>Responsibilities <\/u><\/p>\n<p>The career of an Information security consultant also comes with many responsibilities that mainly focus on protection but doesn\u2019t stop there. Some of their duties that focus on protection include maximizing efficiency in protecting data and information systems, networks, and software against hacker attacks, oversee and conduct tests for system vulnerabilities, and update and upgrade security systems as needed (WGU). Their other responsibilities can include to deliver technical reports and official papers relating to test findings, to give professional supervision and guidance to security teams, and to calculate accurate cost estimations and categorize integration issues for IT project teams (Field Engineer).<\/p>\n<p><u>Relation to Social Science Principles <\/u><\/p>\n<p>The career of an information security consultant can be related to many of the social science principles as they relate to cybersecurity. The first of the social science principles that it can relate to is parsimony. Parsimony means that explanations should be kept as simple as possible and information security consultants have to give reports to their higher ups that should be reported as simply as can be. Another social science principle the career of an information security consultant relates to is empiricism. These workers have to use their sense to create the systems used to defended against cyber-attacks. Relativism is also a social science principle that can relate to their career. With each input of code, they use and can affect a part of the system somewhere else.<\/p>\n<p><u>Conclusion<\/u><\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The career of an information security consultant revolves around protection, using programs to protect against hackers. Throughout their career, they relate to social science principles like parsimony, empiricism, and relativism. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/p>\n<p><u>Sources<\/u><\/p>\n<ol>\n<li><a href=\"https:\/\/www.wgu.edu\/career-guide\/information-technology\/security-consultant-career.html#close\">https:\/\/www.wgu.edu\/career-guide\/information-technology\/security-consultant-career.html#close<\/a><\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol start=\"2\">\n<li><a href=\"https:\/\/www.betterteam.com\/security-consultant-job-description\">https:\/\/www.betterteam.com\/security-consultant-job-description<\/a><\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol start=\"3\">\n<li><a href=\"https:\/\/www.fieldengineer.com\/skills\/cyber-security-consultant\">https:\/\/www.fieldengineer.com\/skills\/cyber-security-consultant<\/a><\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<\/div>\n<\/section>\n<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journals \u00a0 1. NICE Workforce Framework\u00a0 As of right now, I am still uncertain of which career path I want to take through the cybersecurity field. But I am fairly certain that I want to do something protecting others from cyber related crimes and etc. Given this, I believe the protect and defend section of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jordan-johnson\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":23371,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/users\/23371"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/pages\/133\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jordan-johnson\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}