Each person is different and finds motivation to commit cybercrimes, usually for more than one reason. For example, the hacker claims that the cyber-attack was politically motivated but, at the same time, earned a decent financial reward for their effort. The secondary driving factor for cybercriminals is monetary gain since they have to make a…
Category: CYSE 201S
Journal #4: Maslow’s Hierarchy of Needs
Today’s technology can satisfy Maslow’s Hierarchy of Needs. Instacart and Doordash are convenient applications that fulfill the need to satisfy hunger without leaving home. Another example of today’s technology that provides safety at home is the Ring doorbell video camera, which allows you to have a live feed of your front door. My sense of…
Journal #3: Privacy.org
Privacy.org is an excellent information source for researchers investigating data breaches. The sites provide a massive amount of data for researchers to pull from, which is anonymous and provides data from many sources on one website. Researchers draw data from the site to conduct descriptive analyses to comprehend security breaches’ characteristics, including analyzing variables such…
Journal #2: Principles of Science in relation to Cybersecurity.
Through continuous experimentation and improvement, science seeks a deeper comprehension of the natural world. Similarly, cybersecurity experts continuously modify security measures and strategies in response to evolving threats. Regular evaluations, penetration tests, and vulnerability scans improve security posture. Ethical principles guide scientific research and are just as crucial in cybersecurity. Ethical considerations are essential when…
Journal #1: Workforce Framework for Cybersecurity (NICE Framework)
I want to focus my career on system administration since I would gain expertise in various areas, including server management, network administration, cybersecurity, and scripting. My role would often involve diagnosing and resolving complex technical issues, which I find intellectually stimulating and satisfying. Many system administration tasks can be performed remotely, offering work location flexibility…