Journal #6: How to tell if a website is fake

To confirm whether or not a website is fake, pay close attention to the name of the website in the URL. Fake websites often use misspelled variations of well-known domains or domains resembling popular ones. Look for HTTPS in the URL. A secure website should have “https://” at the beginning of the URL and a…

Journal #5: Cybercrime Motive

Each person is different and finds motivation to commit cybercrimes, usually for more than one reason. For example, the hacker claims that the cyber-attack was politically motivated but, at the same time, earned a decent financial reward for their effort. The secondary driving factor for cybercriminals is monetary gain since they have to make a…

Journal #4: Maslow’s Hierarchy of Needs

Today’s technology can satisfy Maslow’s Hierarchy of Needs. Instacart and Doordash are convenient applications that fulfill the need to satisfy hunger without leaving home. Another example of today’s technology that provides safety at home is the Ring doorbell video camera, which allows you to have a live feed of your front door. My sense of…

Journal #3: Privacy.org

Privacy.org is an excellent information source for researchers investigating data breaches. The sites provide a massive amount of data for researchers to pull from, which is anonymous and provides data from many sources on one website. Researchers draw data from the site to conduct descriptive analyses to comprehend security breaches’ characteristics, including analyzing variables such…

Journal #2: Principles of Science in relation to Cybersecurity.

Through continuous experimentation and improvement, science seeks a deeper comprehension of the natural world. Similarly, cybersecurity experts continuously modify security measures and strategies in response to evolving threats. Regular evaluations, penetration tests, and vulnerability scans improve security posture. Ethical principles guide scientific research and are just as crucial in cybersecurity. Ethical considerations are essential when…

Journal #1: Workforce Framework for Cybersecurity (NICE Framework)

I want to focus my career on system administration since I would gain expertise in various areas, including server management, network administration, cybersecurity, and scripting. My role would often involve diagnosing and resolving complex technical issues, which I find intellectually stimulating and satisfying. Many system administration tasks can be performed remotely, offering work location flexibility…

SCADA Systems

SCADA (Supervisory Control and Data Acquisition) systems, also known as ICS (Industrial Control Systems), aim to monitor and control infrastructure, facility-based and industrial processes. The modern SCADA system connects to the network like most other technologies through internet protocol (SCADA Systems, 2023). However, while these changes have made it easier to manage, it also raises…

CIA Triad: The Core of Information Security

The CIA acronym or AIC is Confidentiality, Integrity, and Availability and is the core of information security for organizations. The triad is the backbone of cybersecurity and is essential to organizations in developing security policies and evaluating potential technologies and products (Chai, 2022). The difference between Authentication and Authorization is that one allows access, and…

The Human Factor of Cybersecurity

As the newly hired Chief Information Security Officer tasked with the new cybersecurity initiative with a limited budget to implement additional network cybersecurity upgrades and train staff to be vigilant to potential cybersecurity threats, basic cybersecurity awareness training can enable the employees to be the eyes and ears for the Cybersecurity Incident Response Team (CSIRT)…