Journal 3

Maslow’s Hierarchy of Needs has five levels that are physiological, safety, belongingness and love, esteem, and self-actualization. I believe that my use of technology has embedded itself into my personal hierarchy of needs. Digital technology gives me access to food though the apps on my phone. This makes life more relaxed as you can control…

Journal #4

The United States of America and China have one of the most cyber dependent infrastructures of any nations worldwide. The United States has always been at the leading front of integrating technologies and bolsters a wide integration of technology into its critical infrastructure. China is also in a revolution as its population growth and economic power has…

Journal 2

The six principles of science can be found and related to cybersecurity. Relativism is becoming more apparent as our dependence on technology incorporates itself into our everyday lives. With people wanting more convenient access to personal information and services the need for cybersecurity will only grow. The growth of technology directly relates to the growing…

Journal 1

There are a few areas of the nice workforce framework that interest me. I am particularly drawn to the analysis aspect. I would like to have a role in exploitation analysis or threat analysis. Exploitation analysis interest me because you are assessing your own vulnerabilities and securing those before an adversaries uses it to cause…

Journal #3

The ethical issues that arise from the storage of personal data can be a highly debated topic. One such ethical issue that arises is the use of this data. Corporations and organizations are constantly collecting data on our search history, purchases, and tracking history are just some information that gets collected. However very few have…

Journal #2

There are many majors that Old Dominion University offers that relate to cybersecurity. Cybersecurity is such a wide applicable field that its application can easily be implemented in other majors. The first major that relates to cybersecurity is computer engineering. Computer engineering is the design and development of systems based on computers and complex digital…

Journal #1

Why are you interested in cybersecurity technology?   I have chosen cybersecurity to be my major for many reasons. First of all, cybersecurity is a growing field that is highly in demand. Looking into the future I can only see the demand becoming more and more crucial. Almost every business you can imagine has or will…