Week 5 Journal Entry

With 1 being the most likely and 7 being the least, my list of plausible reasons for cybercrime is as follows: 7. Boredom – Certainly cybercrimes have taken place due to nothing other than boredom but this is not the most likely option.6. Entertainment – much the same as boredom. 5. Recognition – Our society…

Week 4 Journal Entry

Maslow’s hierarchy of needs, in order, is as follows: Physiological needs, Safety and Security, Love and Belonging, Self-Esteem. and Self Actualization. To relate this to technology, my physiological needs would be my hardware, my laptop, video games, anything physical. Safety and security is the steps that I take to ensure my technology stays in tact,…

Week 3 Journal Entry

Privacyrights.org is a website that publicly lists all types of different information about data breaches that can be helpful to those researching them. They list the American states by number of how many breaches occur in them, number of breaches by company, and graphs showing the breakdown of the different types of breaches that occurred….

Week 1 Journal Entry

After reviewing the NICE workforce framework, the area that interests me most is investigation, while the area that interests me the least is overseeing. Cybercrime has always been a fascination of mine so working on things like digital forensics is very appealing to me. However, I have never been fond of being responsible for others….

Principles of Science in Cybersecurity

The principles of science are very relevant to cybersecurity, as they are in many areas of life based around hard facts and results. Having good cybersecurity can look a lot like the scientific method we were taught as kids. One must hypothesize the potential weaknesses in their system, test their hypotheses, and vigorously test as…

Ethical Considerations of CRISPR Gene Editing

The concept of gene editing on an ethical level has the issue where it gets very close to eugenics, something generally thought to be unethical (and I agree). While its currently being talked about getting used to remove genetic illnesses or strengthen the child’s resistances to things like HIV, the technology can presumably be used…

Going on a Job Hunt

A cryptographer is “someone who writes (or cracks) the encryption code used for data security”(1). As someone who is very interested in both encryption and decryption methods and utilities this job intrigues me quite a bit. I would love to learn about the new types of encryptions being developed, different ways they can be cracked,…

The “Short Arm” of Predictive Knowledge

The development of cyber-policy and infrastructure is ongoing and will be for likely as long as we are all alive, as I don’t see the rapid advancement of technology slowing down any time soon. With this advancement inevitably comes greater risks and threats to cybersecurity as a whole. The people attempting to combat these threats…