Journal Entry # 6

Q: Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features and similarities that identify each fake website as fraudulent. Note: Don’t generate or click on unwanted/fake websites on your web browsers….

Journal Entry # 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.  Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of needs relates to my physiological needs on how if I am in bed and the temperature of the room needs adjusting, there…

Journal Entry # 3

Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches and forecast future data breach trends ? Enter a paragraph in your journal. I think with all the information that is on the website and the amount of data to analyze and attempt to…

Journal Entry #1

Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)Links to an external site. When I first look upon this page, and review the work role categories, my least appealing area automatically would be oversight and governance (OG). In my opinion it’s one of the most important areas, but it feels like it would be the…