Review Maslow’s Hierrachy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. Physiological needs: These are basic needs, I would equate this to knowing the very basics of using a computer. Turning it on, logging in and out of…
Author: jirvi002
Module 3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers can definitely use the majority of the information that the database includes to primarily focus on how to stop a certain type of breach. They can see what…
Module 2
Explain how the principles of science relate to cybersecurity I feel that the principles of science relate to cybersecurity by creating an attachment between traditional science and cybersecurity. Things like relativism being able to mean all things are related can be used to describe computers in a whole. A cpu, router, website, firewall, etc. all…
Module 1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. I would prefer to focus my career on the Operate & Maintain framework. Working in the IT areas of the workforce is…
Career Paper
Jordan Irving 12/8/22 Cyse 201S An Ethical Hacker What is an Ethical Hacker? In simple terms it is an individual that is hired by a company to hack into their systems in order to find vulnerabilities, this allows the company to find out what areas they need to fortify so that they can prevent other…
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
Cyber technology is ever changing, there is no way to know the direction or trend it will follow in the next century, much less the next decade. That being said I feel that as the new age of developers and innovators move into the light they should try and follow the original ideology of technology,…
How does cyber technology impact interactions between offenders and victims?
Cyber technology has created a few issues when it comes to crimes and the interactions between the offender and the victim. The first one that comes to mind is the interactions between young children and predators. This issue is a problem simply because of the availability that these pedophiles have to underage people. They go…
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
Overlap between criminal justice and cybercrime definitely exists. A cybercrime is still a real crime so you will be dealt with accordingly by the criminal justice system. Cybercrime rates have been rising in recent years with the rise of using technology to commit crimes. Both of these things need each other to succeed since in…
How do engineers make cyber networks safer?
Engineers make cyber networks safer by creating and modifying systems that protect people’s devices. They are able to run the software that can prevent firewall breaches as well as any cyber attacks that may be directed at systems. Since they are engineers they should have access to any type of security measures that can be…
Describe three ways that computers have made the world safer and less safe.
Computers can easily be described as a necessary evil. They have brought so many positive advancements to the world but have also brought in things that make the world more dangerous. An example of a positive would be the advancement of medical practices. Without computers, there would be no X-rays, no ultrasounds, and no MRIs….