Journal #8 Cybersecurity In Movies

I think that hacking scenes in movies, accurate or not. Are more used to set the stakes or act as downtime development more often than not. As hacking scenes in movies can be a helpful form of plot development and can help showcase the capabilities of a cast member, they are often simplified or filled…

Journal #7 Meme

The main message behind this meme is that due to human systems integration in the organization, the cybersecurity professional can now have a reduced workload thanks to the fact that all systems and policies have been designed around the employees as a whole, retaining efficiency while improving security.

Journal #6 Real Websites and their Impostor’s

More often than not, the most dangerous and common variety of fake website is one that pretends that it is a legitimate website by copying it’s URL and layout to the best of the hackers abilities. However, there are several indicators of a websites validity, the first being obvious. More often than not, fake websites…

Journal #5 Motives for hacking

After reviewing the articles in question, I have compiled a tierlist on which explanation is the most logical for hacking. #7 Recognition- Unfortunately, in this digital age of both network tracing and even cameras. Being a daring anonymous user who hacks for recognition is a fleeting career at best. As it may only take one…

Journal #4 The hierarchy of needs

In Maslow’s Hierarchy of Needs, there are 4 levels. The first and second is dedicated to the basic physiological and security needs of an individual, the third and fourth concern the health of the self through the assurance of family and friends and self esteem. The final step of the pyramid concerns the individual achieving…

Journal #3 Data Breaches

Privacy Rights Clearinghouse, a nonprofit organization dedicated to allowing easy access of information related to internet security and privacy. Has an archive which extends from present day to February 2nd, 2005, from 2020 to present day alone, there have been a reported 4,843 breaches reported in the United States alone alongside almost 143 million records…

Journal #2 The principles of science in cybersecurity

It can be argued that cybersecurity is just as connected to the social sciences as the technological sciences, to elaborate. As cybersecurity concerns the defense of systems against human aggressors and behavior, the social sciences allow us to delve into the thinking process and potential motivations of any hacker that may attempt to access systems…

Journal #1 NICE Workforce Framework thoughts

After reading the draft, I think the main areas I would be focused on are Investigation and Oversee/Govern and my area of least priority would be Protect and Defend. To elaborate, I think I would do good with Investigation and Overseeing as they are typically responsible for strategizing and implementing policies alongside post breach evaluation….

Writeup #3- Ethical Considerations of CRISPR Gene Editing

BioCybersecurity as both a concept and a concern is currently both an underdeveloped field and a underexplored one at that. The primary reason for this rather unknown status is the fact that It only really became a concern less than 20 years ago with the advent of gene editing. An example of a potential problem…