Journal Entry Week 7 – Explain how the following three memes relate to human-centered cybersecurity

Phishing is one way cybercriminals trick individuals into giving them sensitive information, downloading viruses, and/or clicking malicious links. Human-centered cybersecurity can address phishing emails by understanding human behavior/decision making and creating the proper security measures to avoid it. Therefore, the following meme above shows a man having a conversation with a few other people. He…

Journal Entry Week 6 – Real Vs. Fake Websites 

Note: Please do not click on the fake websites Fake Websites:  https://teechip.com/ https://www.vivobarefotsale.com/ https://www.belenkasale.com/ Real Websites:  https://www.target.com https://www.amazon.com https://www.usps.com A couple ways you can authenticate a website are: Look for errors in the URL & on the website – Many fake websites contain grammatical and punctuation errors. Confirm the contact page – You can confirm…

Journal Entry 1 – NICE Workforce Framework Review

Implementation and Operation is one career path I would like to focus on. Some of the work roles within that field are, Data Analysis, Network Operations, System Security Analysis, and Technical Support. Those work roles pique my interest the most. One reason these work roles interest me is that keeping our operational systems running or…

Journal Entry 2 – How the principles of Science relate to Cybersecurity

I believe that the scientific principles of relativism, objectivity, parsimony, ethical neutrality, and determinism must be adhered to cybersecurity. Below are explanations I have for each scientific principle and how it relates to cybersecurity. Relativism – Technology drives changes in our world, and changes in our world drive the changes in our technology. That’s where…

NICE Workforce Framework Review

Implementation and Operation is one career path I would like to focus on. Some of the work roles within that field are, Data Analysis, Network Operations, System Security Analysis, and Technical Support. Those work roles pique my interest the most. One reason these work roles interest me is that keeping our operational systems running or…