Journal Entry 08

The Media Influences the Understanding of Cybersecurity: The media has become a constant influence on many of our operations, including cybersecurity. For instance, in terms of hacking and criminal cyber crimes in general, we can see the depiction within films and shows. In many of the movies that are in the world today, they show…

Journal Entry 07

Cybersecurity Memes: Ensuring that we utilize trustworthy sites is crucial for dynamic and safe browsing for everyone! In this meme it shows how important it is to make sure we use trustworthy and legitimate websites, making sure the information we are providing is being protected and used for our intended purpose. Having confidence in your…

Journal Entry 06

How can you spot fake websites? What makes them fake? At first glance, one may not always notice the signs of a fake website. However, there are some indicators that individuals/organizations can look out for. It is important to take caution when browsing the internet, as fake websites often have malicious intent for the information…

Journal Entry 05

Cybercrime Motivations: Most cybercrime can be described by a simple, or complex, motivating factor. It can be beneficial to identify these motives and research the crimes and actions related. I have ranked the following cybercrime motivations with one being the highest and 7 being the lowest.

Journal Entry 04

Maslow’s hierarchy and the experience with technology: Maslow’s hierarchy of needs describes the individual relationships between behavior and action. These needs can be listed as: self-actualization, esteem, belongingness and love, safety, and physiological needs. We can apply Maslow’s theories upon the motivations of cyberattacks, whether it be from the cyber experts or the cyber criminals….

Journal Entry 03

Importance of data breach research: It is of critical importance to report and research breach data for a number of reasons. Some of the most crucial being: identifying immediate vulnerabilities and weakness, threat intelligence, risk assessment, awareness, etc. Data breach research will help cybersecurity measures improve and remain adaptive as we move through a constantly…

Journal Entry 02

Principles of Science: Cybersecurity The principles of science are intertwined with cybersecurity. The scientific studies allow for the analysis and observations of information, including cyber information. This evidence can tie into incident reports with statistical information, display patterns and behaviors, and aid in monitoring through networks. Having effective visibility and awareness is crucial in building…

Journal Entry 01

The focus of my career: The National Initiative for Cybersecurity Education (NICE) workforce framework is the organization and standards within the cybersecurity workforce. These standards are in place to help provide common grounds for network safety and how behavior is conducted. Within this framework there are many different focus areas. I feel that I would…