Entry #5

Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

Money makes the most sense to me. Cash is required to support everyone’s living, you cannot do anything without money coming in. Political would be my second. Politics is about leveraging and making messages to interrupt legislation, and it makes sense to get the biggest message so more people are inclined to comply with the law. Motives fueled by revenge are ranked third for me because I understand the drive to make someone else pay for wronging you are someone close to you. Multiple reasons are my fourth because logically, it’s vague and covers many problems. Recognition is fifth, as people have a need for power to gain more. Entertainment is sixth and boredom is seventh; they provide no gain for the people doing.

Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.

Maslow’s Hierarchy of Needs successfully demonstrates the layered levels of needs and fulfillment. The influence of technology on the basic need level has been communication. It is almost impossible to connect with the world without using technology, this communication being social media, messages, and the ability to call. Psychologically, technology has affected my behavior and my way of thinking. I’ve grown up with computer and television access, which has given me entertainment that allowed me to discover my likes and dislikes, satisfying my psychological needs. In terms of self-fulfillment, technology aids my growth in higher education. My college experience would be nothing without technology. My laptop allows me to work on my coursework and gives me additional resources so I can study for my classes.

Entry #3: How Public Information Help Researchers

Prompt: Visit PrivacyRights.orgLinks to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

Given the information provided by PrivacyRights.org researchers may use their information to collect large-scale numbers that follow different types of breaches. Anyone who goes on their website can look at their continuously updating breach notifications, researchers can use this information to extend their safety features by knowing how many people are being affected by breaches, a chance to get ahead of attacks, and informing others through the extensive data collected by PrivacyRights.org. Advocating for the average consumer who may not be as aware of breach securities and their rights when it comes to their personal information. They provide support to the population by keeping updated information on new policies and tracking companies that are currently or have experienced security breaches.

Entry #2: Principles of Science to Cybersecurity

Prompt: Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?

The principles of science relate to cybersecurity because both are built on the need to collect information accurately and informatively.  For example, objectivity is a crucial principle for science as it allows the facts to be clearly presented without bias involved. Bias can alter and interpret facts in a completely new way and occurs in almost everything the public consumes. Objectivity in cybersecurity will allow a direct statement of facts and will allow those to find a problem without distractions. Cybersecurity must have these clear functions in order to properly work and protect the information it is securing, keeping the project’s integrity and purpose. Without these principles, science and cybersecurity would be deeply misinterpreted and dangerous. 

Entry #1: Looking at NICE Workforce Framework

Prompt: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

After reviewing the NICE Workforce Framework I have discovered an interest in Cyberspace Effects and Cyberspace Intelligence. I lean towards the workforce field that involves creating analysis of cyberspace information. All-source analysis and collection management appeal to me the most as I would like to explore planning and developing an operational environment for the sake of collecting relevant information. Along with ensuring that platforms are performing properly as described with target network analysis. Oversight and governance is not a section of cybersecurity I would consider. I am not interested in the redistributing legislation as described in Cybersecurity Legal Advice. Similarly the idea of keeping a project regulated within the law and studying that law like with Privacy Compliance.