Journal entry 7

The movies that the hacker goes over in the video all have some connection to hacking and cybersecurity. Certain movies are more accurate in their depictions than others. certain scenes are made more cinematic or interesting, instead of accurate, to make it more presentable or palatable to a wider audience and make more money. This…

Journal entry 6

The connection to human systems integration is that I am not very knowledgeable on that field so researching it results in me feeling very small in comparison to the vast amount of information.

Journal entry 5

There are many ways to identify fake or sketchy websites from real ones. One of the best and easiest is to look in the top left, right next to the url, if there is a closed lock then it is probably trustworthy, as the connection to the site is secure. Another red flag is if…

Journal entry 4

Money-using hacking to gain large quantities of money makes sense, if you’re good enough. Due to a lack of cybersecurity professionals, many people could get away with it. Political-hacking a popular site or social media outlet is a very efficient way of getting your message out into the world, as it is likely to be…

Journal Entry 3

My personal experiences with technology in reference to Maslow’s Hierarchy of Needs, I would rank as Safety needs. While I personally do not require technology to maintain my body’s functions (some people do), I do need it to accomplish many basic things, such as completing work, paying for things, buying things, connecting with loved ones.

Journal entry 2

Researchers can use information on diversity in cybersecurity to study data breaches. Computer science and engineering are not enough to understand cybersecurity on their own. Recognizing that different disciplines can contribute to our understanding about cybersecurity will provide a more diverse response to the issue. Most cybersecurity attacks can be traced to individual people. By…

Article Review 1

The topic of gangs relates to social studies because gang structure and influence have an impact on how people go about their day, even in cyber space. Also gang members themselves use social media to promote themselves, which can be used to find their location or crimes they committed. Gang studies often use location-based approaches…

Journal entry 1

The scientific method is 7 steps. They are: Ask a question Perform research Establish your hypothesis Test your hypothesis by conducting an experiment Make an observation Analyze the results and draw a conclusion Present the findings These same steps can be applied to cybersecurity. The question being asked is “is this site/device secure?” The research…