Category: IDS 493
After All These Years
“After all these years, I’ve come to realize that self-reflection is not just a journey; it’s the compass that guides us to our truest selves.”
Python
Technical Skills “Python: Where elegance meets functionality, and code becomes poetry. In my journey through the Basic Programming course, I undertook a compelling final project—an interactive “Number Guessing Game.” Guided by foundational programming concepts, I designed a user-friendly interface where players attempt to decipher a randomly generated number within a predefined range. Through this endeavor,…
Journal 5: Individual motive
In terms of ranking these motives, it ultimately depends on the specific context and situation. However, in general, financial gain is likely the most common and pervasive motive for cybercriminals. As the article notes, cybercrime can be a lucrative business, with stolen data and personal information being sold on dark web marketplaces for substantial amounts…
Journal 4: Maslow’s Hierarchy of Needs
Maslow’s Hierarchy of Needs is a psychological theory that explains the five basic human needs, which include physiological needs, safety needs, love and belonging needs, esteem needs, and self-actualization needs. Here’s how each level of Maslow’s Hierarchy of Needs relates to my experiences with technology: Physiological Needs: This level refers to the basic needs for…
Journal 3: Privacy Rights
Researchers use public data gathered by Data Breaches to aid in the prevention of cyber-attacks as well as providing useful information to bring awareness to data breaches to consumers. The resources are massive, this is a perfect site for researchers to study from; whether you choose to become knowledgeable of recent law overviews (referencing for…
Journal 2: Explain how the principles of science relate to cybersecurity.
Cybersecurity is the practice of protecting computer systems, networks, and digital information. The principles of science can be related to cybersecurity as an applied science, which is defined as a general classification for the real-world application of scientific knowledge and research. Cybersecurity, applied physics, aerospace and communication are all examples of applied science. Other forms…
Journal Entry1: NICE Framework
The Workforce Framework for Cybersecurity, commonly referred to as the NICE Framework, is a nationally focused resource to help employers develop their cybersecurity workforce. It establishes a common lexicon that describes cybersecurity work and workers regardless of where or for whom the work is performed. The framework consists of 7 categories: Analyze, Collect and Operate,…
Workplace Deviance
According to Oxford dictionary deviance is defined as “the fact or state of straying from conventional or recognized standards, especially in social or sexual behavior”. It is behavior that goes against organizational norms, for example a coworker bullying or hazing a coworker, viewing explicit content on company time, sharing company secrets with competitors, and sabotaging…
The Legal System Response to Technological Advancements
As technology advances, the need to regulate it becomes imminent and there are a couple of things that legislators can do to become more proactive to fill in the growing gaps on the legal side of things. The constant interaction with technology and analyzing various legal implications of possible innovations is a way that can…