People can commit cybercrimes for a variety of reasons. These reasons can change from person to person or even from crime to crime. The following is how I would place the 7 motivations (money, multiple reasons, political, revenge, boredom, entertainment, and recognition) in order from most motivating to least motivating reasons for committing crimes.
Journal Entry #4: Maslow’s Hierarchy of Needs
Maslow’s Hierarchy of Needs begins with the bottom layer of physiological needs. These are things that you absolutely need to survive like food, water, shelter, rest, etc. In some ways, technology has become almost a physical need. When I wake up in the morning, my phone is often the first thing I reach for, and…
CYSE 200T: Journal Entry #3
Ethical issues regarding electronic information are generally concentrated around the confidentiality portion of the CIA triad. Who has access to what data is a big concern among the public, and sometimes it seems like companies are requiring more and more “unnecessary” information. The following are some of the major ethical issues regarding the storage of…
Journal Entry #3: Data Breaches
Information on data breaches can be very helpful for both the public and researchers. Knowing how and when data was breached and what information was taken can help researchers create patterns and trends both regarding the stolen information and what is then accomplished with the stolen information. They can investigate patterns concerning company information such…
Journal Entry #2: Scientific Principles and Cybersecurity
Robert Bierstedt categorized science into six main principles: relativism, objectivity, parsimony, skepticism, ethical neutrality, and determinism. Relativism is the idea that all things are related to each other in some way or another. Within the cybersecurity field, this can be clearly seen through the intersection of cybersecurity with various other disciplines. For example, with the…
Journal #1: NICE Workforce Framework
There are several areas of interest to me in the NICE Workforce Framework, but the top two would be in the analyze and training/education categories. Any of the analysis subcategories would be interesting to me. I am good at reviewing large amounts of data to extrapolate the critical elements and I have excellent attention to…
CYSE 200T: Journal Entry #2
There are many other majors offered at ODU that relate to cybersecurity in some way. I will discuss four of these majors below and how they connect to cybersecurity. Clearly, all four of these majors have applications to the cybersecurity world. There are many other majors that have crossovers into the cybersecurity world as well,…
CYSE 200T: Journal Entry #1
I am interested in cybersecurity technology for several reasons. First, it is a huge field that is continuously growing. There are always new threats to address which means new things to learn. It is never stagnant, and so, to me, that means it remains interesting. It also intersects with several other disciplines which also increases…