I used this meme because as you can see here there is a dog using an ipad. Dogs are never in ads when they are promoting it so they’re never taken into consideration when in the process of them being made. This is because Human system integration has to deal with the development or improvement…
Can spot three fake websites and compare them to three real websites, plus showcase what makes them fake?
Fake: https://web.archive.org/web/20050224090555/http://www.martinlutherking.org/https://web.archive.org/web/20161201213424/http://abcnews.com.co/obama-executive-order-bans-pledge-of-allegiance-in-schools/https://zapatopi.net/treeoctopus/ Real: https://www.cnn.com/https://www.amazon.com/https://www.apple.com/ Spotting real websites vs fake ones is starting to become a difficult task in this era of the cyber world. People have now gained the skills in order to mimic real websites in order to execute their scam as needed. Spotting fake websites can be hard to do but here’s just…
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
After Reviewing the seven individuals’ motives, I came to an order I believe makes the best sense. The order I’ve decided to go with is money, recognition, revenge, politics, entertainment, multiple reasons, and lastly boredom. The reason for the order is quite simple, money is the leading drive for all crimes, even those outside of…
Article Review 1
After going through several articles in the international journal of cybersecurity criminology, I stumbled across one article that caught my eye “ LGBTQ Cyberbullying on Online Learning Platforms Among University Students”. Cyber bullying is a cybercrime that has become a new way of harassing individuals in the cyber world and is rapidly increasing. This article’s…
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
The Hierarchy of needs are divided into three major groups that then divided into 5 subgroups. The first group is Self-fulfillment needs which helps one achieve his/her full potential including creative activity. I relate to this section because I own a clothing brand and with the use of technology, I have been able to create…
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Reachers may use this type of information to know what type of things hackers are looking for and how much damage has been done. Having this type of information out to the public allows for companies and high management security systems to implement updates to their systems as needed. Putting all of the breaches on…
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
After searching into the NICE Workforce Framework, I was presented with seven categories. The three categories I want to focus my career on are protect and defend, operate and maintain, and analyze. I know for a fact that the career I want is somewhere in the defense side of cybersecurity. I wanna be able to…
Explain how the principles of science relate to cybersecurity
The principle of science in cybersecurity helps us to gather data and understand humans with technology all at one time. It gives us structure within the networks of devices, tools and techniques, and behavior of humans. If we didn’t have science in cybersecurity a lot of things wouldn’t have answers to them. Science gives us…
CIA Triad, and the differences between Authentication & Authorization
The CIA triad is an information security model that helps guide organizations when it comes to keeping their data secured. The CIA is made up of three key components, which are confidentiality, integrity, and availability with each having their own part of importance. Confidentiality goes for only allowing authorized users to be able to access…
Human Behavior
After reading an article from Capone and Cyberbitsetc.org it made me think about how human error is more common in data breaches than I thought they were and having a balance between training and additional technology is vital in order to keep an organization or companies private information secure. In Capone’s article he states, If…