Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Another great method to detecting if a website is fraudulent or not is to check its’… Continue Reading →
Tristan Karl2/11/2024Article Review #1 Bugs in our pockets: the risks of client-side scanning | Journal ofCybersecurity | Oxford Academic (oup.com)Author: Harold AbelsonStudent: Tristan KarlDepartment of Computer Science, Old Dominion UniversityCYSE 201S: Cybersecurity and the Social SciencesInstructor: Diwakar YalpiDue: February 11,… Continue Reading →
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). … Continue Reading →
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? By studying the recent data breaches and understanding the different ways that they happen, we can come up with solutions to prevent… Continue Reading →
Explain how the principles of science relate to cybersecurity. My understanding of this prompt is to describe how we use the scientific method to research the field of cybersecurity. All in all, these scientific principles are used in the cyber… Continue Reading →
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
After reviewing the NICE Workforce Framework, I think I would want to focus my career in cybersecurity on either Cyber Investigation or Exploitation Analysis. The aspect of surveillance and counter-surveillance, surveillance detection, and finding gaps in a network's security sounds really interesting, and I could definitely see myself pursuing that. Being an ethical hacker for a company seems very enticing, along with helping build the architecture for the company and becoming an irreplaceable part of their network security.
I would want to stray away from the customer service and technical support aspect of the job because my experience with customer service has not been the greatest and I understand that people do not appreciate customer service usually unless they themselves have worked in customer service before.
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE Workforce Framework, I think I… Continue Reading →
© 2025 Tristan Karl — Powered by WordPress
Theme by Anders Noren — Up ↑