Physiological needs: Apps like grocery delivery services (Instacart or Uber Eats) or health tracking devices help ensure access to food and monitor sleep. When I use grubhub to order food at the webb it fulfills my needs. Safety needs: Password managers or two-factor authentication systems protect personal data. When I try to sign into my…
Author: ksams002
Article Review #1
Influence of Cyberattacks on Public Support for Cybersecurity Policies The article titled “Cyberattacks, cyber threats, and attitudes toward cybersecurity policies”explores the relationship between cyberattack exposure and public support for cybersecurity regulations. The study, conducted in Israel, also investigates how perceptions of threat mediate this relationship. This study contributes to the social sciences by examining how…
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Researchers can use publicly available data from PrivacyRights.org to study data breaches by analyzing trends over time, identifying common breach methods, and assessing the types of organizations most affected. PrivacyRights.org Data Breach Chronology provides information about breach types (hacking, insider threats) and organizations targeted (healthcare, education, financial services). By examining this data, researchers can track…
Explain how the principles of science relate to cybersecurity
The principles of science are deeply connected with cybersecurity. Empirical evidence and testing which are fundamental to science, guide the evaluation of security measures through simulations and real-world trials. Hypothesis testing in cybersecurity involves identifying and investigating potential threats and vulnerabilities. Predictive models and data analysis help anticipate and manage risks, while continuous innovation ensures…
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least
An area that stands out to me and is an area I would like to focus my career on is in security control assessment. Security control assessment is essential for protecting an organization’s information systems and data. The work directly contributes to safeguarding against cyber threats, breaches, and other security risks, which is crucial in…
How Should We Approach the Development of Cyber-policy and -infrastructure given the “short arm” of Predictive Knowledge?
The “short arm” of predictive knowledge refers to the viewpoint and ethical conduct of each situation being immediate, and, as there is no way to omnisciently know the future repercussions of the decision made, there is no way to evaluate the shortcomings of said decision. As we approach the development of cyber policy and cyber…
How Does Cyber Technology Impact Interactions between Offenders and Victims?
In today’s society, the relationship between victims and attackers is changing due to the ongoing cybercrime around the world. In the past, crimes were committed face to face. Robbery is an example. In the past, robbery was the physical taking of valuable possessions by one person from another. This often causes victims physical insecurity and…
What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
I consider the overlap between criminal justice and cybercrime will continue to advance. Today, global crime is increasingly committed online rather than in person. This trend means that cybercrime and criminal justice cannot overlap. A common example of how cybercrime and criminal justice intersect is the dark web. Stealing and selling IDs and credit cards…
How Engineers Make Cyber Networks Safer
Cybersecurity networks can always be improved to ensure maximum security for their users. Cybernetworks often communicate with other users to find out how they were attacked and to make updates, to help reduce the risk of cyberattacks. Engineers build cyber networks and constantly strive to improve them. Creating a new cyber network is very important…
3 Ways that Computers Have Made the World Safe and Less Safe
In today’s society, almost every part of daily life revolves around computers. Technology is impacting nearly every aspect of life in the 21st century, from transportation efficiency and safety, to access to food and healthcare, to socialization and productivity. Computers have many advantages and they help make the world a better place. However, computers are…