Modern-day warfare has changed a lot in these modern days as cybersecurity is now a crucial part of warfare and the DOD has specifically been forced to defend the security of this nation. Namely, information warfare is rising looking to states and third parties as nations can very easily manipulate information leading to distrust within…
cybersecuity analyst
Becoming the first line of defense you will be the front desk for the companies of corporations when becoming a cybersecurity analyst. Providing guidance and employee training is one of the jobs and crucial for keeping the network secure as human factors are the highest risk and vulnerability when it comes to cybersecurity. A theme…
Social Media and Cybersecurity
When taking the Social Media Disorder Scale I found myself answering yes to a lot of the questions making me think about how addicted I am to social media. This was very surprising to me as I didn’t see myself as someone who was extremely addicted to social media. To be diagnosed as a disorder…
How the media influences our understanding of cybersecurity
Movies specifically have a huge societal impact on the population as they portray cybersecurity. In most movies, it is portrayed as very easy, unrealistic, and has a significant lack of code. It is very apparent that this portal is used just for the entertainment of the audience Another key issue with these movies is how…
Cybersecurity memes
When you’re part of the human firewall When you’re reading the regulations and standards When you finally finish applying the regulations and standards Privacy when coding just like how private the network is Team culture about safeguarding Me when the system feedback is positive analysing a user fall activity The real risk of networks/systems training…
Fake websites vs. Real websites
Fake websites mimic real websites to steal someone’s financial or personal information. Many ways to make a fake website such as a weird domain name, lackluster design, and lack of reviews online. There are other apparent issues with fake websites but a majority can be figured out with some analysis. These are some examples of…
How does cyberbullying contribute to the psychological stress among Female Employees?
I hypothesize that cyberbullying has a negative impact and enhances the psychological stress upon female employees. This topic relates to any aspect of social sciences such as gender issues, mental health, and social dilemmas within the workplace. This is seen through the comparison between the way women and men are treated within the workplace and…
How does Routine Activity Theory explain the interactions of individuals involved in Illegal Gambling on the DarkNet?
This topic relates to the field of social sciences as it very much relates to criminology and sociology. Human behavior is studied through why these individuals commit the cybercrimes there motivations which also relates to criminology. I hypothesize that Routine activity Theory explains how and the reasoning behind individuals’ gambling is for profit or to…
Reviewing the articles linked with each individual motive and ranking them from 1-7 (1 being the least sense)
I would say these seven motivations would be in this order because people need to somehow pay for their lifestyle whether that is paying for housing, food, or investments.
Maslow’s Hierarchy of Needs and how they relate to technology
In relation to physiological needs are primarily essentials that are needed in order to survive such as food and water. Technology enables applications such as sleep apnea machines which keep people alive during sleep. Other technology would include safety features such as a ring doorbell which makes it possible to see who’s at your front…