Check the URL: Scammers often create fake websites with URLs that are very similar to the real ones. For example, instead of “paypal.com,” they may use “paypa1.com” or “paypal-login.com.” Always check the URL carefully before entering any sensitive information. Look for typos and grammatical errors: Many fake websites contain typos, grammatical errors, and awkward phrasing….
Category: CYSE 201S
Journal #5
In my view, political motives are the most reasonable for cyber attacks since they can be used to gain access to sensitive information or disrupt political opponents. The attack on the 2016 U.S. presidential election by Russian hackers is an example of this motive. Revenge is another understandable motive for cyber attacks as individuals or…
Journal #4
Maslow’s Hierarchy of Needs is a theory that categorizes human needs into five levels, with the most fundamental needs at the bottom and the highest needs at the top. In order to move to the next level, individuals must first meet the needs at the lower levels. These levels include physiological needs, safety needs, love…
Journal #3
After learning different types of data breaches, I believe that the information published on PrivacyRights.Org does not carry enough information to be of help to researchers that studies data breaches. Yes, the website did go on to explains the different types of breaches and the name of the businesses/organizations that reported had data breaches on…
Journal #1
Before deciding that Cybersecurity is the career path that I want to pursue, I had a hard time choosing which Cybersecurity path I want to focus my career on. After reading NICE Workforce Framework, of all the career path that was discussed, Vulnerability Assessment Analyst and Cyber defense Analyst are one of the career paths…