All of the pictures are talking about how the use of technology can be dangerous. They all stress the point of being safe online and give scenarios of where information can be compromised and/or stolen. Human Systems Integration is an interdisciplinary managerial and technical approach to developing and sustaining systems which focuses on the interfaces between humans…
Journal Entry #6
For this entry, I am going to compare three fake websites to three real websites. Additionally, I will explain what makes the fake websites fake. It is important to note that these examples of fake websites that I am going to be using are no longer in existence. This is due to them being exposed…
Journal Entry #5
The seven individual motives for cybercrime are entertainment, political, revenge, boredom, recognition, money, and multiple reasons. In my opinion, money is the number one reason, and it makes the most sense. Most people commit cybercrime because of financial gain. A cybercriminal may steal sensitive and confidential information and hold until a ransom is paid. Another…
Journal Entry #4
Maslow’s Hierarchy of Needs has five different levels of needs. The first level is physiological needs. This includes basic needs like food, water, warmth, and rest. In today’s society, technology has become a basic need instead of a luxury. Without it, humans cannot get tasks done for work or use it to care for their…
The Study of Aggressive Reality Docuseries and Their Impact on Human Behavior
The first study is taken from the International Journal of Cybersecurity Intelligence & Cybercrime. The study is made up of four different empirical study and research articles, but I am only going to focus on one. These empirical research articles apply the social science principle of empiricism. Empiricism is a principle that means that all…
Journal Entry #3
PrivacyRights.org is a website that contains a list of data breaches that have occurred since 2005. Researchers can use this public data to prevent future data breaches and attacks. Additionally, this same information can be used to develop secure safeguards and can be used to serve as an example when training employees and staff. Companies…
Journal Entry #2
There are many ways in which the principles of science relate to cybersecurity. Let’s examine how relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism all relate to what cybersecurity is about. The first principle is relativism. This principle states that everything is related somehow. In cybersecurity, cyber-attacks can happen very often. These attacks can have…
Journal Entry #1
The NICE Framework explains seven different workforce categories. They are Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, and Securely Provision. Under each category, there are specialty areas that can employees focus on. Cyber Defense Analysis, which is under the Protect and Defend category, fascinates me the most and…