CYSE201S Journal Entry (7) Cybersecurity Memes

Review the following ten photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.

CYSE201S Journal Entry (6) Identifying Fake Websites

The internet is full of websites and within the internet, there are also fake websites that aim to cause harm to their victims. In order to stay away from fake websites it is important to be able to identify key factors that could indicate that a website isn’t genuine. Firstly is to make sure the…

CYSE201S Journal Entry (5) Ranking Crime Motives

Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. Articles and corresponding motives: • Entertainmenthttps://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ • Political https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms • Revenge https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/ • Boredom…

CYSE201S Journal Entry (4) Maslow’s Hierarchy of Needs to Technology

Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. Above is the Maslow’s Hierarchy of Needs. While the original creation of the hierarchy was not intended to relate to the digital experiences of society. The overall…

CYSE201S Journal Entry (3) Studying Data Breaches

Prompt: Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? The information provided by the given site aids in the research of data breaches in different ways. One is by giving specific categories of the different areas of data breaches. These different categories are…

CYSE201S Journal Entry (2) Principles of Science & Cybersecurity

Prompt: Explain how the principles of science relate to cybersecurity The principles of science are as follows; Relativism, Objectivity, Parsimony, Empiricism, Skepticism, Ethical Neutrality, and Determinism. When talking about relativism the principle stems from that all things are related. Therefore applying this to cybersecurity can come in many different examples. A couple of examples are…

CYSE201S Journal Entry (1) NICE Workforce Framework

Prompt: Review the NICE Workforce Framework. Are there specific areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The NICE Framework is a national resource that provides guidance to those who wish to develop their cybersecurity workforce. The composition…