Write a paragraph describing social themes that arise in the presentation video. After watching this video, I can conclude that cybersecurity analysts face many social aspects of cybersecurity. In the video, the woman talks about how important networking could be to obtain a job in cybersecurity. She gives examples such as building experience through working…
Journal Entry 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity After reading this article, I have recognized the importance of social cybersecurity in this day and age. Social cybersecurity focuses more on human behavior, social, cultural, and political outcomes to understand cyber threats. Social cybersecurity differs from the original…
Journal entry 9
Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? 1. Regularly found that you can’t think of anything else but themoment you will be able to use social media…
Journal Entry 8
Watch this video and pay attention to the way that movies distort hackers. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity I think the media influences the wide understanding of cybersecurity to a great extent. After watching the video, I gained some insight on…
Journal Entry 7
Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). https://www.canva.com/design/DAGUIJPLj1k/COasLmPnGqoGkRoVo65XDw/edit?utm_content=DAGUIJPLj1k&utm_campaign=designshare&utm_medium=link2&utm_source=sharebutton
Journal Entry 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? The first fake website I found was a dupe of Amazon.com. This website’s URL was amaz0n.com. The difference between the real Amazon website and the fake is the number 0 used…
Journal Entry 5
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. The article that I…
Journal Entry 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Physiological needs relate to my experiences with technology by allowing me to wake up everyday and live. On this level it mostly contains basic living…
Journal Entry 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. After looking at PrivacyRigths.org, I can conclude that the website may enable researchers to know information and data about, definitions of personal information, biometric data protection, and notification timelines. Based on…
Journal Entry 2
Explain how the principles of science relate to cybersecurity. Relativism relates to cybersecurity by giving the idea that a change in a system can lead to another change in system. Objectivity relates to the subject by disregarding biases when researching or collecting data based on a cybercrime or a hackers motives. Furthermore, parsimony is the…