Module 6 Journal Entry

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake globalresearch.ca oneworld.press ABCnews.com.co There are multiple ways to identify if a website is fake or not. One big key is a lack of web design. Another key is spelling and…

Module 5 Journal Entry

Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense to the least sense. Explain why you rank each motive the way you rank it. Boredom, Entertainment, Money, Multiple Reasons, Political, Recognition, and Revenge. 7. Entertainment Hacking or sabotaging a…

Module 4 Journal Entry

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Physiological Needs If I were to compare the basic needs of life to my experience with technology, I would say it is incomparable, as I…

Module 3 Journal Entry

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Researchers can use this information to spread the word on the many types of data breaches, how often they occur, and what you can do to prevent it from happening. In the effort…

Module 2 Journal Entry

Explain how the principles of science relate to cybersecurity. Cybersecurity relates to the principles of science because it has an association with all seven principles. To start off, cyber security is an applied science. Applied science is the gathering of theories, knowledge, methods, and techniques, that is used to protect the confidentiality of our data, uphold the…

Module 1 Journal Entry

Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE Framework and taking a look at the many different careers I noticed that they are all unique in their own way. The career…

Review of “Towards an Improved Understanding of Human Factors in Cybersecurity”

Nicholas Malley Review of “Towards an Improved Understanding of Human Factors in Cybersecurity” Reference: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8998491             The article relates to the principals of the social sciences because it acknowledges the human factors in cybersecurity. Human factors associated with cyber security discuss the potential and limitations along with the interaction of humans towards computer devices. The…