Criminology will teach you that there is a myriad of reasons people commit crime and committing various cyber attacks occur in similar fashion. Now the difference in rankings between why someone might commit a crime vs someone who would commit a cyber crime might be significantly different. The most relevant reason would of course be…
Category: Journal
Journal
Journal #4
I am able to apply Maslows’s Heirarchy of Needs to a single type of technology that I usepretty often, and I know others use far more frequently than myself. That technology is digitalpayment systems, whether it is Venmo, Cashapp, Paypal, Affirm, Applepay, Googlepay orSamsung Pay, depends on the situation, but all forms of digital payment….
Journal #3
Researchers can use the data available on privacyrights.org to conduct many different studies. The data available begins with regional and local occurrences, then is further broken down by even more categories. Those categories include things such as; the type of breach, the type of organization or business the breach occurred with, and number of people…
Journal #2
The principles of science as related to cybersecurity, and according to Robert Bierstedt, both natural and social sciences principles being the same, means that a focus on observing data and being neutral in analysis is important. Those principles being relativism, objectivity, parsimony, empiricism, ethical neutrality and determinism allow for an interconnected study, using ethical standards…
Journal #1
The certain areas I would like to focus my Cybersecurity career on, based on the NICE Workforce Framework are; Systems Security Management, Security Control Assessment, Cybersecurity Policy and Planning, or Executive Cybersecurity Leadership. Much of this decision is based on cybersecurity being my second career, I have already served and retired from the United States…