Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? When comparing real websites to fake ones there were a few things I noticed to compare and be on the lookout for, Fake websites will try to trick you by using a popular…
Journal Entry #5
Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it.
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Technologies both reflect and alter the cultural and social settings in which they are used. They are influenced by current conditions and driven (or not)…
Journal Entry #3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. After reviewing the website one can look over the different type of breaches and use that to their advantage. It is important to stay aware of breaches when researching…
Journal Entry #2
Explain how the principles of science relate to cybersecurity. Cybersecurity is still known as a field of science although it is mainly technical. Although the topic is not tangible, a social science framework outlines why it follows all the same principles as natural sciences. These principles are known as: Determinism, Relativism, Objectivity, Parsimony, Skepticism, and…
Journal Entry #1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The NICE framework is used by the cybersecurity community across the board. The framework generalizes cybersecurity as definition and what its key…