Journal Entry 9
I completed the social media disorder scale however I’m not sure how to find my score. The only question I said yes to was question number 8. “Often used social media to escape negative feelings.” So I suppose this may be a score of one out of nine. As far as the items in the…
journal entry 8
From watching the video and from our readings in class I have come to understand that the media distorts public perception of hacking quite a bit. I myself at a young age was a part of this false perception, growing up watching films like War Games. Most media depicts hacking as an almost mystical act….
Week 7
This meme I created was about human cybersecurity and specifically I wanted to talk about why someone might be incentivized to commit cyber crimes. In this Meme we can see that they wanted to commit the crime because of monetary incentive. This relates back to human cybersecurity because it is a determining factor for cybercrime….
Journal Entry 6
The above website is a fake website trying to impersonate google. If you look at the url you can see that it says www.goooogle.com instead of www.google.com, by using this fake url they can lure in unsuspecting users. This image also showcases a fake website attempting to mimic a very large website. Again here as…
Week 4 Journal Entry CYSE 201S
Self-Actualization: Self-Actualization relates to my experiences with technology because I often use technology as an extension of myself. It allows me to perform tasks at a rate I wouldn’t be able to do without it. As well if I was an amputee technology would allow me to potentially have use of a limb again. Esteem:…
Journal Entry 3 CYSE 201S
One of the ways a researcher might use a site like privacy rights to research information about breaches is to use the geographical function of the website. This part of the website allows the user to see breaches by where in the continental United States they happened. By understanding this map you can start to…
Journal Entry 2 CYSE 201
Relativism as a discipline of Science related to Cybersecurity in that all systems are connected in Cybersecurity. What this means is that whenever you change something in your system it will change everything else. You must observe these changes and plan around them or it will negatively affect your system. Looking at all the disciplines…
Week 1 Journal 201S
In looking at the NICE Workforce Framework for Cybersecurity one of the areas that stood out to me, both as being interesting and as a potential career place was investigation. I have always found investigating to be an interesting job and adored detective work. From that vein I have been interested in Digital Forensics which…