Journal Entry 8

I thought about how the media constantly shapes our perceptions of cybersecurity nowadays. In all of its manifestations, the media is a powerful force in influencing public opinion, knowledge, and even misconceptions around cybersecurity. The representation of cybersecurity in media, including news sources, motion pictures, and television shows, frequently succumbs to sensationalism and oversimplification, creating…

Journal #7

https://unsplash.com/photos/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8 Meme: Nice! Public Wi-Fi here ! This relates to human centered security framework because it demonstrates how people do not sometimes realize the risk that they are putting themselves through certain actions that they take. For instance, public Wi-Fi is one of the most unsafe networks to use. It is considered unsafe because using…

Journal 6

Fake Websites: While initiating my research I was able to conclude that the following websites are fake due to their characterizations. Fake Website 1: DiscountElectronics.com.co Fake Website 2: BestFashionDeals.net Fake Website 3: SuperMedicinesOnline.biz Real Websites: Real Website 1: Amazon.com Real Website 2: Nike.com Real Website 3: MayoClinic.org Contact Information: Trust Indicators: Legitimacy: Ultimately, the authenticity…

Journal #5

Regarding cybercrimes there are many individual motives involved when performing these malicious attacks. While going through the various motives, I was able to rank them from the most sense to the least sense. I believe that the number one motive that most makes sense would be for money. I believe that cybercriminals ultimate motive is…

Maslow’s Hierarchy of Needs

Maslow’s Hierarchy of Needs is a psychological theory that categorizes human needs into five levels, with each level building upon the previous one. Maslow’s Hierarchy of needs involves physiological needs, safety needs, love and belongingness needs, esteem needs, and social actualization needs. In summary, Maslow’s Hierarchy of Needs can be related to technology in various…

Journal #3

While visiting PrivacyRights.org I was able to identify many ways researchers can use the information available to study data breaches. Through doing their research they can be able to analyze the frequency, scale, and nature of the data breach over time. This would provide them with insights to trends and patterns of these data breaches….

Principles of Science relating to Cybersecurity

Relativism is understood as all things are normally related in some way. Relativism helps us recognize how broader technological changes influence behavioral dynamics, economic decisions, policy making and social processes. For instance, we can understand that in most cases changes that happen in one system usually led to changes in another system. The principle of…

Journal Entry #1 NICE Workforce Framework

The NICE Workforce framework consists of many components. When review the certain areas that Cybersecurity focused on , I found many areas to be interesting. I believe that of all the areas I would want to focus my career on is Cyber Operations. Cyber Operations “Performs activities to gather evidence on criminal or foreign intelligence…

NIST Cyber Security Framework

The Framework is a guide based on existing standards, guidelines, and practices for organizations to better manage and reduce cyber security risk or attacks. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cyber security management communications between both internal and external organizational stakeholders. The Framework would help…