Part 1: Scenario: One day you receive a letter from a business that you often make online purchases. The letter states that there has been a breach from a third-party provider and that unauthorized access has exposed customers’ credit card numbers. They inform you that your data has been exposed. Receiving this kind of information can be alarming as personal… Read more →
Journal Entry 10: Part 1 and 2
Part 1: Social Themes in Cybersecurity Analyst Job Social themes that arise in a cybersecurity analyst job are strong communication skills as the job requires a professional to educate and train other employees. The end users on the network are a liability to the entire system as human error is the most exploitable vulnerability. Having strong communication with personnel is… Read more →
Article Review 2
Article Review: “I Can Actually Be a Super Sleuth”: Promising Practices for Engaging Adolescent Girls in Cybersecurity Education The Information technology (IT) field is ever-expanding. Modern civilization is heavily reliant on the infrastructure that IT provides. As the reliance increases, so do attacks on these systems. This problem is only growing and must be meant with a robust highly trained workforce to… Read more →
Journal Entry: 9
The Social Media Disorder scale is a rubric that can be utilized for self-reflection in the context of your personal social media use. The following are my results… In the past year have you… “Regularly found that you could not think of anything else but the moment that you would be able to use social media again?” -No, however, when… Read more →
Journal Entry: 8
How do you think the media influences our understanding of cybersecurity? The media has a direct influence on how society views cybersecurity. As cybersecurity can be an abstract concept to the average individual, it can be challenging to collect self-evidence to conceptualize one’s reality of security online. Media can provide a perception that can generate awareness for such issues as… Read more →
Journal Entry: 6
How to spot a fake website? Spotting a fake website can be tricky in this day in age where creating a legitimate-looking website is not as difficult as it once was. However, they are certain things to stay diligent about when surfing the web. Always look at the URL and analyze it for any misspellings or anything that might seem… Read more →
Article Review 1
A reverse digital divide: Comparing information security behaviors of generation Y and generation Z adults. Technology in the digital realm has shaped users’ behavior and beliefs in the sense of security in the cyber world. Do these security behaviors vary with the regard to age? Are the best practices being exercised more by digital natives as they are seen as… Read more →
Journal Entry: 5
When it comes to committing crimes, there are many motivations an individual may have behind committing an offense. The top seven motives why an individual commits cybercrimes are entertainment, political intentions, revenge, boredom, recognition, money, and multiple reasons. To rank the motives from 1 to 7, from the one that makes the most sense (1) to the least senses (7),… Read more →
Journal # 4
Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Maslow’s Hierarchy of Needs is an illustration of a pyramid listing human needs -starting from the bottom are the basic needs of survival (like food and water). Once these basic needs of survival are met, humans can then focus their attention on thriving. This theory… Read more →
Journal Entry: 3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. -To study data breaches, researchers can access archive records of past data breaches provided by PrivacyRights.org. This database provides information about what is publicly known about certain breaches. A researcher can use this… Read more →