Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? After completing the Social Media Disorder scale, I scored a 4.0. The items in the scale are very indicative of a social media…
Author: ktayl088
How the Media Influences our Understanding of Cybersecurity.
Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. After watching this video, I have come…
Human Systems Integration Memes
Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). My memes relate to human systems integration by describing the importance of user training. Some of the benefits of this can go outside of the workplace, as many security…
How to Spot a Fake Website
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? For this assignment, I was tasked to spot three fake websites. Though I do not feel comfortable with visiting fake websites due to the risk of being infected with a virus,…
Different Hacking Motivations
There are five common reasons for hacking. They are entertainment, political, revenge, boredom, recognition, for money, and for multiple reasons. My task was to rank each of these motivations on a scale of 1 to 7, with 1 being the most reasonable, and 7 being the least reasonable. Entertainment: 5. This is not a good…
How Can My Digital Experiences Relate to Maslow’s Hierarchy of Needs?
Maslow’s Hierarchy of Needs is a concept that suggests “that all humans have needs that exist on a hierarchy.” This theory consists of a pyramid, with the lowest level describing the physiological needs of food, shelter, water, and rest. The next level is safety needs, which is security. An example of this would be having…
How Might Researchers Use the Information Provided by privacyrights.org to Study Breaches?
For this assignment, I had to visit privacyrights.org to research the privacy information provided by their website. Researchers could utilize this publicly available information for several purposes. On this website, a full-disclosure report of the California Consumer Privacy act and what it entails. It shows consumers how their data is being used and what rights…
How do the Principles of Science Relate to Cyber Security?
There are six principles of science, relativism, objectivity, parsimony, skepticism, ethical neutrality, and determinism. Relativism means “how all things are related”, which can be applied to cyber security by describing the fields connected to the practice. This includes the health care system, social system, educational system, critical infrastructure system, and more. These systems are all…
NICE Workforce Framework for Cyber Security
For this assignment, I was tasked to visit this website to determine certain areas that Iwould want to focus my career on. I have found which areas would appeal most to me and which would appeal the least. Of the areas listed, the ones I would want to focus my career on are “Operate and…