Maslow’s Hierarchy of Needs – Journal Entry 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs five levels: Psychological Needs, Safety Needs, Belongingness and Love Needs, Esteem Needs, and Self-Actualization. Psychological Needs: Maslow identifies basic physical needs […]

Read more "Maslow’s Hierarchy of Needs – Journal Entry 4"

How Media Influences Our Understanding About Cybersecurity – Journal Entry 8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. I believe that through news reports, articles, and other forms of coverage, the media often highlights high-profile cyber incidents, emphasizing the severity of threats and potential vulnerabilities in our digital world. While this awareness is essential […]

Read more "How Media Influences Our Understanding About Cybersecurity – Journal Entry 8"

Spotting Fake and Real Websites – Journal Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake: https://zapatopi.net/treeoctopus/ , https://web.archive.org/web/20161201213424/http://abcnews.com.co/obama-executive-order-bans-pledge-of-allegiance-in-schools/ , http://www.thedogisland.com/ Real: https://hampton.gov/ , https://www.odu.edu/ , https://www.walmart.com/ The fake websites that I listed include misinformation and faulty links, especially with the characteristics of “.net” and lack […]

Read more "Spotting Fake and Real Websites – Journal Entry 6"

PrivacyRights.org and Breach Research – Journal Entry 3

Researchers interested in studying breaches can use information from PrivacyRights.org in various ways such as data breach trend analysis, impact assessments, as well as security practices evaluations, and legal and regulatory compliance. PrivacyRights.org provides information on data breaches that researchers can analyze to identify trends and patterns in breach attacks over a certain period of […]

Read more "PrivacyRights.org and Breach Research – Journal Entry 3"

The Relationship Between Science and Cybersecurity – Journal Entry 2

The principles of science play a large and important role in the functionality and understanding of cybersecurity as they aid in recognizing, assessing, and managing the ever-changing risks and vulnerabilities in the digital world. Two essential principle of science that contributes to cybersecurity is data analysis and pattern recognition. It is a critical component of […]

Read more "The Relationship Between Science and Cybersecurity – Journal Entry 2"