Module 6 Journal Entry

The video from Insider starring the professional security analyst Keren Elazari, where she rated how realistic the hacking was from various movies, made me appreciate how accurate the hacking scenes were for most of the movies showcased. Only a few movies from old franchises have inaccurate hacking scenes, which also stemmed from old misconceptions. Pondering…

Module 5 Journal Entry

There are several factors that contribute to an individual’s decision to commit a cybercrime. Ranging from extrinsic, intrinsic, or potentially both. Over time, an individual’s motives have been boiled down to seven reasons. This journal entry will rank each motive from the most probable to the least likely based on personal reasoning. We will start…

Module 4 Journal Entry

Maslow’s Hierarchy of Needs is a pyramid chart that represents the fundamental needs that humans desire on a basic level. There are five levels for this pyramid: Physiological needs, Safety needs, Belongingness and Love needs, Esteem needs, and Self-actualization. These five levels can be grouped into three parts: basic needs, psychological needs, and self-fulfillment needs….

Module 3 Journal Entry

The Privacy Rights Clearinghouse is a nonprofit organization that records data breaches that occur across the United States in chronological order and makes this information publicly available for users to view within a database. Researchers can utilize this available information in various ways to study data breaches. Researchers can analyze data on data breaches to…

Module 2 Journal Entry

There are seven principles of science: Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, Determinism, and Skepticism. Each principle has its level of depth that can be explored and discussed for ages. However, these principles also relate to the realm of cybersecurity. Within this essay, definitions will be given for each principle with an example of how…

Module 1 Journal Entry

For all of the work roles established within the National Initiative for Cybersecurity Education, also known as NICE, they all have their importance while also having their pros and cons. However, for my interests, the categories within these roles that I found the most intriguing to the least intriguing would be Protection and Defense (PD),…

The “Short Arm” of Predictive Knowledge

According to Hans Jonas, there is an idea that human beings do not consider the long-term effects, positive or negative, that technological advancements have on the world at large. He refers to this as the “short arm of predictive knowledge.” In the worst possible case, a Pandora’s box might be opened, bringing in ramifications that…

The Human Factor in Cybersecurity

The human factor is one of the most critical elements in cybersecurity. The employees would be the heart of the cybersecurity facility. Without them, the operation wouldn’t be possible. As a Chief Information Security Officer, managing the organization’s funds is crucial. This is how I would allocate between my team and the cybersecurity technology.First things…

The CIA Triad

The CIA triad is a security model that is designed to help guide policies for information security within an organization. Another name for this would be the AIC triad, to sometimes avoid confusion with the other CIA organization. CIA stands for Confidentiality, Integrity, and Availability. These three key concepts work in conjunction with one another…