Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. For the first level of need in Maslow’s Hierarchy of Needs I use technology to get things such as food and warmth. I use multiple…
CYSE 200- Entry 6
How has cyber technology created opportunities for workplace deviance? First to define what workplace deviance is a type of behavior that violates the organization’s rules or norms and can threaten the organization in a negative way or the other people around them. With this being said there is plenty of opportunity that cyber technology could…
CYSE 200- Entry 5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Create an application that allows a system to encrypt wheneverYacht system that would allow you or the driver to relax while it drives youBuild an application that protects dataEcommerce security Resynchronizing after an attack that has happened to the…
CYSE 200- Entry 4
Compare cybersecurity risks in the U.S. and another country.Cybersecurity has always been a risk since technology was made. The only difference is nowadays as we keep advancing with technology there become even more cyber risk with this. Security risk will continue to be a problem because some people want to sabotage things for no reason…
CYSE201 – Entry 2
Cybersecurity is an applied science in a way. People that are in this field are very creative in certain ways and use the facts they know to then make some type of scientific discovery to create something in the technology field. For example a useful application or software maybe. The scientific inquiry will bring a…
CYSE 200- Entry #3
With storing electronically information nowadays it is way easier to do and easier to keep up with the information you stored. The only thing is there are flaws when it comes to dealing with hackers trying to get personal information. The four ethical issues that arise are Privacy, confidentiality, security breaches in the information and…
CYSE200- Entry 2
The four majors that I selected that are also related to cybersecurity are Computer Science, Computer Engineering, Criminal Justice, and Information systems & technology. To start off with Computer Science this is related in many ways to cybersecurity. Computer science is more of a broad field of the study of computers and computing, but cybersecurity…
CYSE201- Entry 1
The first field in cyber security that appeals to me the most is protect and defend. The reason why is it seems more hands on with the problem that is happening. I act very well under pressure and in high urgent situations that could pop up. It seems like there is more responsibility and fast…
CYSE200- Entry 1
Growing up around my dad who is in cybersecurity himself and seeing all that he can do has just made me become more intrigued at what the field has to offer. Growing up in times like these, new technology is developing every second and I find it very important to know about the safety precautions…