I think that hacking scenes in movies, accurate or not. Are more used to set the stakes or act as downtime development more often than not. As hacking scenes in movies can be a helpful form of plot development and can help showcase the capabilities of a cast member, they are often simplified or filled…
Journal #7 Meme
The main message behind this meme is that due to human systems integration in the organization, the cybersecurity professional can now have a reduced workload thanks to the fact that all systems and policies have been designed around the employees as a whole, retaining efficiency while improving security.
Journal #6 Real Websites and their Impostor’s
More often than not, the most dangerous and common variety of fake website is one that pretends that it is a legitimate website by copying it’s URL and layout to the best of the hackers abilities. However, there are several indicators of a websites validity, the first being obvious. More often than not, fake websites…
Article Review #1-“Do You Love Me? Psychological Characteristics of Romance Scam Victims”
This research paper documents the typical background and motivations of victims affected by online dating romance site frauds, the introduction gives a basic background on the subject at hand and is effectively the thesis to this entire paper. The next segments, known as Typology of Victims and Romance Scam Typology. Detail both the general characteristics…
Journal #5 Motives for hacking
After reviewing the articles in question, I have compiled a tierlist on which explanation is the most logical for hacking. #7 Recognition- Unfortunately, in this digital age of both network tracing and even cameras. Being a daring anonymous user who hacks for recognition is a fleeting career at best. As it may only take one…
Journal #4 The hierarchy of needs
In Maslow’s Hierarchy of Needs, there are 4 levels. The first and second is dedicated to the basic physiological and security needs of an individual, the third and fourth concern the health of the self through the assurance of family and friends and self esteem. The final step of the pyramid concerns the individual achieving…
Journal #3 Data Breaches
Privacy Rights Clearinghouse, a nonprofit organization dedicated to allowing easy access of information related to internet security and privacy. Has an archive which extends from present day to February 2nd, 2005, from 2020 to present day alone, there have been a reported 4,843 breaches reported in the United States alone alongside almost 143 million records…
Journal #2 The principles of science in cybersecurity
It can be argued that cybersecurity is just as connected to the social sciences as the technological sciences, to elaborate. As cybersecurity concerns the defense of systems against human aggressors and behavior, the social sciences allow us to delve into the thinking process and potential motivations of any hacker that may attempt to access systems…
Journal #1 NICE Workforce Framework thoughts
After reading the draft, I think the main areas I would be focused on are Investigation and Oversee/Govern and my area of least priority would be Protect and Defend. To elaborate, I think I would do good with Investigation and Overseeing as they are typically responsible for strategizing and implementing policies alongside post breach evaluation….
Writeup #3- Ethical Considerations of CRISPR Gene Editing
BioCybersecurity as both a concept and a concern is currently both an underdeveloped field and a underexplored one at that. The primary reason for this rather unknown status is the fact that It only really became a concern less than 20 years ago with the advent of gene editing. An example of a potential problem…