Journal #7

Human-centered Cybersecurity Framework Meme

Journal #6

Most of the fake websites are done up just enough to look correct to the unawares eyes. But for those aware, the fake websites are fairly easy to recognize if paying attention, here are some examples to be aware of. The domain name may have misspelling or substituted letters like Cyrillic “a” or a capital…

Article #1 Cyberbullying and Cyberbullicide

A study was conducted in Jordan investigating the impact of cyberbullying on youth cyberbullicide. This relates to the social sciences as this falls within the scope of the top seven reasons cybercrime is committed. It may also fall into one or more of the four types of psychological theories psychodynamic, cognitive, behavioral and personality. The…

Journal #5

Criminology will teach you that there is a myriad of reasons people commit crime and committing various cyber attacks occur in similar fashion. Now the difference in rankings between why someone might commit a crime vs someone who would commit a cyber crime might be significantly different. The most relevant reason would of course be…

Journal #4

I am able to apply Maslows’s Heirarchy of Needs to a single type of technology that I usepretty often, and I know others use far more frequently than myself. That technology is digitalpayment systems, whether it is Venmo, Cashapp, Paypal, Affirm, Applepay, Googlepay orSamsung Pay, depends on the situation, but all forms of digital payment….

Journal #3

Researchers can use the data available on privacyrights.org to conduct many different studies. The data available begins with regional and local occurrences, then is further broken down by even more categories. Those categories include things such as; the type of breach, the type of organization or business the breach occurred with, and number of people…

Journal #2

The principles of science as related to cybersecurity, and according to Robert Bierstedt, both natural and social sciences principles being the same, means that a focus on observing data and being neutral in analysis is important. Those principles being relativism, objectivity, parsimony, empiricism, ethical neutrality and determinism allow for an interconnected study, using ethical standards…

Journal #1

The certain areas I would like to focus my Cybersecurity career on, based on the NICE Workforce Framework are; Systems Security Management, Security Control Assessment, Cybersecurity Policy and Planning, or Executive Cybersecurity Leadership. Much of this decision is based on cybersecurity being my second career, I have already served and retired from the United States…

Navy Exchange Service Command (NEXCOM) HQ

IntroductionThere is a level of honesty that I will apply to the question of why decided to do an internship with this company. The first statement I have, is it was the only company to call me back post interview with an offer to join their company as an intern. The second statement I have,…

NEXCOM Internship Reflection #6

More professional development for Interns! I recommend an internship at the Navy Exchange Service Command to anyone trying to develop professional experience while in their college tenure. This company spends a lot of time and money into their interns, even though most of them are only going to be in the company temporarily. The most…