Journal 7: 3 Memes that relate to human-centered cybersecurity

Everyone seems friendly online You never know who you are really interacting with Keep in mind that one can be anything online, and proceed with caution, safeguard your information and pay attention. Human-centered cybersecurity acknowledges that humans make mistakes, but being the first line of defense you can make choices that limits your risk factors.

Journal 6: Can you spot 3 fake websites?

I looked up Louis Vuitton bags for sale, and typed that in the google search bag. Many websites came up that said “authentic” Louis Vuitton bags, new or used for sale. One way I could determine if it was a fake website was that the website added words before or after to alter the Louis…

Article Review #1 CYSE201S

Cybersecurity during COVID-19 I will be detailing my understanding of the article “Cybersecurity when working from home during COVID-19: considering the human factors” by Monica T Whitty, Nour Moustafa, and Marthie Grobler. The research conducted was from a social constructionist view with emphasis on Vygotsky’s theory of learning, as a basis. COVID-19 Before the COVID-19…

Journal #5 Ranking Motives

1. For money2. Multiple reasons3. Political 4. Recognition5. Revenge6. Entertainment7. Boredom This is the ranking I came to after reading each article in the module. Some of the articles did not really turn out to be how I envisioned them but still very insightful. Money is the root or in some way can be correlated…

Journal 4 : Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

It is interesting how I correlate Maslow’s Hierarchy of Needs to my experiences with technology. I had to really ponder things I normally take for granted. The base of Maslow’s Hierarchy of Needs is Physiological. How I translate this is my shelter, my home. I use technology everyday to make my life comfortable, such as…

Journal 3 -Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

The website PrivacyRights.org is a tool not only to learn about data breaches, but also advocacy, education and law overview. There are many free and resourceful overviews and question and answer type resources that are free and offer some great insight. Researchers can utilize the Data Breach Chronology Database on the website but will have…

Journal 2 – How Do The Principles Of Science Relate To Cybersecurity

The Principals of Science briefly described:Relativism- The concept that all things are relatedObjectivity- Scientists need to be neutral, not opinion based when doing studies or researchParsimony- Keeping scientific explanations as simple as possible.Empiricism- Scientists can only study things that are real to the senses.Ethical Neutrality- Ethical standards must be adhered when conducting researchDeterminism- A principle…

Journal 1-Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

. The areas of the NICE (National Initiative for Cybersecurity Education) Workforce Framework I would like to focus on in my career would be centered around Oversee and Govern (OV) specifically training, education and awareness. Training, education and awareness in cybersecurity would be focused on all areas of training, prevention of crime, best practices and…