How Media Influences Our Understanding About Cybersecurity – Journal Entry 8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. I believe that through news reports, articles, and other forms of coverage, the media often highlights high-profile cyber incidents, emphasizing the severity of threats and potential vulnerabilities in our digital world. While this awareness is essential […]

Read more "How Media Influences Our Understanding About Cybersecurity – Journal Entry 8"

Spotting Fake and Real Websites – Journal Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake: https://zapatopi.net/treeoctopus/ , https://web.archive.org/web/20161201213424/http://abcnews.com.co/obama-executive-order-bans-pledge-of-allegiance-in-schools/ , http://www.thedogisland.com/ Real: https://hampton.gov/ , https://www.odu.edu/ , https://www.walmart.com/ The fake websites that I listed include misinformation and faulty links, especially with the characteristics of “.net” and lack […]

Read more "Spotting Fake and Real Websites – Journal Entry 6"

Journal Entry 14

Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site. has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Read more "Journal Entry 14"

PrivacyRights.org and Breach Research – Journal Entry 3

Researchers interested in studying breaches can use information from PrivacyRights.org in various ways such as data breach trend analysis, impact assessments, as well as security practices evaluations, and legal and regulatory compliance. PrivacyRights.org provides information on data breaches that researchers can analyze to identify trends and patterns in breach attacks over a certain period of […]

Read more "PrivacyRights.org and Breach Research – Journal Entry 3"

The Relationship Between Science and Cybersecurity – Journal Entry 2

The principles of science play a large and important role in the functionality and understanding of cybersecurity as they aid in recognizing, assessing, and managing the ever-changing risks and vulnerabilities in the digital world. Two essential principle of science that contributes to cybersecurity is data analysis and pattern recognition. It is a critical component of […]

Read more "The Relationship Between Science and Cybersecurity – Journal Entry 2"