WEEK 8: How do you think the media influences our understanding about cybersecurity?

The media has a big impact on how we see cybersecurity, often swinging betweenrealistic and exaggerated portrayals. One moment, we might see a serious report about a majordata breach affecting millions, making viewers anxious and more aware of real risks. The next,we’re bombarded with dramatic headlines about hackers lurking in the shadows or cyberapocalypse doomsday…

WEEK 6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

1) PayPalIn late 2023 there were a series of websites that were mimicking PayPal logins. These fake loginURLs would be sent through messages with impersonations of PayPal URLs. The goal of thesefake pages was to gain the consumers trust and have them input their Login User ID andpassword. Once consumers were done inputting their information,the…

WEEK 5: Review the articles linked with each individual motive in the presentation page or Slide #4.Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to theleast sense (being 7). Explain why you rank each motive the way you rank it.

I would rank the motives for cybercrime as follows: First, “for money” is the strongest motivebecause many people commit crimes to make money. Second, “Revenge” makes sense due topeople who feel wronged might turn to cybercrime to get back at someone. Third, the “Political”motive is important, especially with hacktivism, where people act online to support…

WEEK 4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs explains what motivates us, from basic needs to personal growth. For physiological needs, I use delivery apps like Door Dash and Uber Eats to get food easily. Financial Safety needs are met through online banking apps that help keep my money secure. I connect with friends on social media like Instagram,…

WEEK 3: PRIVACYRIGHTS.ORG

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? By utilizing the data in PrivacyRights.org, researchers can analyze trends in data breaches by examining the frequency and severity of incidents over time, thus revealing patterns that highlight vulnerabilities across various industries. For instance, sectors like healthcare…

WEEK 2: PRINCIPLES OF SCIENCE AND CYSE

Q)  How do the principles of science relate to cybersecurity? For starters, Parsimony, a principle of science advocating for the simplest solution with the fewest assumptions, is vital in cybersecurity. By choosing straightforward approaches, cybersecurity experts can further implement and manage measures more effectively, reducing the risk of complex vulnerabilities. This simplicity aids in quicker…

WEEK 1: NICE WORKFORCE FRAME WORK

Q) Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE workforce framework, there are a couple areas that stand out to me the most that I’d like to incorporate…

ABOUT ME

Greetings Everyone! My name is Christian! I am currently a Junior, as well as a Cybersecurity Major at Old Dominion University! When I’m not at ODU during the semester, I am fulfilling my duties as an Air Force Reservist with an AFSC in the cyber field. I am originally from Atlanta, Georgia. However, I’ve lived…