Next, complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? After watching the video above, I took the social media disorder scale test. I said yes to one out of nine of the…
Category: 201S
Journal Entry 8 – How does the media influence our understanding on cybersecurity?
Watch this video and pay attention to the way that movies distort hackers. Here are my thoughts after watching the following video. The media can strongly influence our understanding on cybersecurity in many ways. Most movies, TV shows, and video games depict hackers as someone who is extremely fast at what they do, as well…
Journal Entry Week 7 – Explain how the following three memes relate to human-centered cybersecurity
Phishing is one way cybercriminals trick individuals into giving them sensitive information, downloading viruses, and/or clicking malicious links. Human-centered cybersecurity can address phishing emails by understanding human behavior/decision making and creating the proper security measures to avoid it. Therefore, the following meme above shows a man having a conversation with a few other people. He…
Journal Entry Week 6 – Real Vs. Fake Websites
Note: Please do not click on the fake websites Fake Websites: https://teechip.com/ https://www.vivobarefotsale.com/ https://www.belenkasale.com/ Real Websites: https://www.target.com https://www.amazon.com https://www.usps.com A couple ways you can authenticate a website are: Look for errors in the URL & on the website – Many fake websites contain grammatical and punctuation errors. Confirm the contact page – You can confirm…
Journal Entry 5 – Ranking Individual Motives
Below is how I would rank each individual motive, based off which would make the most sense to the least amount of sense.
Journal Entry 4 – Relating each level of Maslow’s Hierarchy to my experiences with technology.
How does each level of Maslow’s Hierarchy of Needs relate to my experiences with technology? Below I have split up each level of need with examples on how it relates to my personal experiences with technology. Physiological Technology does not fulfill our basic life necessities like water, food, clothing, and shelter. However, technology has become…
Journal Entry 3 – How can researchers utilize publicly available information about data breaches?
PrivacyRights.org is one of many different websites that researchers may use to view publicly available information about data breaches. Researchers can utilize this information in many ways to learn more about the types of breaches and how they occurred. The data collected is not only important to researchers but also organizations. Understanding the methods used to…
Journal Entry 1 – NICE Workforce Framework Review
Implementation and Operation is one career path I would like to focus on. Some of the work roles within that field are, Data Analysis, Network Operations, System Security Analysis, and Technical Support. Those work roles pique my interest the most. One reason these work roles interest me is that keeping our operational systems running or…
Journal Entry 2 – How the principles of Science relate to Cybersecurity
I believe that the scientific principles of relativism, objectivity, parsimony, ethical neutrality, and determinism must be adhered to cybersecurity. Below are explanations I have for each scientific principle and how it relates to cybersecurity. Relativism – Technology drives changes in our world, and changes in our world drive the changes in our technology. That’s where…
NICE Workforce Framework Review
Implementation and Operation is one career path I would like to focus on. Some of the work roles within that field are, Data Analysis, Network Operations, System Security Analysis, and Technical Support. Those work roles pique my interest the most. One reason these work roles interest me is that keeping our operational systems running or…