Nadia Simpson

Author's posts

Journal Entry #6

The difference between a real website and a fake website is that a real website has a padlock next to the URL while a fake website doesn’t have the padlock next to it. A fake website would send you phishing emails that ask for personal information like credit card numbers, social security numbers, and login …

Continue reading

Journal Entry #5

1- Political 2. Money 3. Revenge 4. Recognition 5. Multiple Reasons 6. Entertainment 7. Fun I ranked all the motives the way I did because hacking for political reasons made the most sense. After all, it helps support movements, exposes corporations, and shuts down apps that support right-wing extremists and hate groups. I ranked fun …

Continue reading

Journal Entry #4

Maslow’s hierarchy of needs talks about the needs that humans have and their motivations behind those needs. Maslow’s hierarchy of needs starts with Physiological needs and ends with self-actualization. With self-actualization when it comes to technology, I can engage with my hobbies like listening to music, shopping, and playing video games. Physiological needs are like …

Continue reading

Journal Entry #3

PrivacyRights.org shows the laws in different states when it comes to data and their privacy. The website also shows the most common types of data breaches and the companies that have the most data breaches. I feel like researchers can use this information to come up with methods to prevent the amount of data breaches …

Continue reading

Journal Entry #2

When it comes to the intersection of cybersecurity and principles of science, the principle of parsimony stood out to me the most. In cybersecurity, it is important to analyze the underlying reasons why individuals commit cybercrimes. The PowerPoint discusses self-control theory which states the people commit crimes specifically cybercrimes due to a lack of a …

Continue reading

Journal Entry #1

After reviewing the NICE framework, I have decided to focus my career on risk management, digital forensics, and exploitation management. The area that intrigues me the most would be exploitation analysis because I am interested by how vulnerabilities and exploits causes massive data breaches of big corporations. By understanding these weaknesses in network systems and …

Continue reading

Hello World!

This is a post. Use posts to update your blog.