Social media has created a lot of misconceptions about cyber security. As technology has advanced so have a lot of perceptions about the capabilities of technology. I believe social media has tricked a lot of people into believing that cybersecurity… Continue Reading →
We have many misconceptions about cybersecurity. Here, hackers tell you about some of ourmisconceptions. What personal misconceptions did you have before you started to studycybersecurity? Have those been proven right or wrong?I had many misconceptions about cybersecurity before I began… Continue Reading →
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the… Continue Reading →
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of needs is composed of five needs…. Continue Reading →
Personal Information: I am twenty-two years old and a US Navy Veteran. Education: Studying for a bachelor’s degree in Cybersecurity. Work History: I worked as an Aviation Electrical Technician on Boeing F/A-18E/F Super Hornets for four years. During this time,… Continue Reading →
Data breaches are becoming more common as our society becomes more connected to the internet. Researchers can use the information provided on https://privacyrights.org/data-breaches to determine where most data breaches are concentrated and which type of data is being stolen. Individuals… Continue Reading →
The principles of science are relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. Relativism is that all things are related. All advancements directly relate to the cybersecurity field. In the upcoming 2024 presidential elections, individuals within the cybersecurity field will… Continue Reading →
The seven categories of the NICE Framework are Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, and Securely Provision. I rank the categories that interest me from most to least by Oversee and Govern,… Continue Reading →
© 2026 201S E-Portfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑