Here are four majors offered by Old Dominion University and their relevance to cybersecurity: Computer Science: This major focuses on programming, software engineering, data structures, and algorithms. These skills are fundamental in developing cybersecurity software and tools that safeguard networks, systems, and data from cyber threats. Information Technology: This major deals with computer systems, web…
Journal #2
The principles of science are highly applicable to cybersecurity since it concerns the safeguarding of information and information systems from possible threats and vulnerabilities. Cybersecurity experts apply principles like empirical observation and experimentation to gain an understanding of how systems can be compromised and test the effectiveness of security measures using tools such as network…
Journal #7
“When you spend months designing the perfect system, only to realize you forgot to factor in human error.”
Journal #6
Check the URL: Scammers often create fake websites with URLs that are very similar to the real ones. For example, instead of “paypal.com,” they may use “paypa1.com” or “paypal-login.com.” Always check the URL carefully before entering any sensitive information. Look for typos and grammatical errors: Many fake websites contain typos, grammatical errors, and awkward phrasing….
Journal #5
In my view, political motives are the most reasonable for cyber attacks since they can be used to gain access to sensitive information or disrupt political opponents. The attack on the 2016 U.S. presidential election by Russian hackers is an example of this motive. Revenge is another understandable motive for cyber attacks as individuals or…
Journal #4
Maslow’s Hierarchy of Needs is a theory that categorizes human needs into five levels, with the most fundamental needs at the bottom and the highest needs at the top. In order to move to the next level, individuals must first meet the needs at the lower levels. These levels include physiological needs, safety needs, love…
Journal #3
After learning different types of data breaches, I believe that the information published on PrivacyRights.Org does not carry enough information to be of help to researchers that studies data breaches. Yes, the website did go on to explains the different types of breaches and the name of the businesses/organizations that reported had data breaches on…
Journal #1
Before deciding that Cybersecurity is the career path that I want to pursue, I had a hard time choosing which Cybersecurity path I want to focus my career on. After reading NICE Workforce Framework, of all the career path that was discussed, Vulnerability Assessment Analyst and Cyber defense Analyst are one of the career paths…