The youtube video we had to watch, reminded me of my little siblings because I show them different things that I learn about hacking and cybersecurity that way they’ll know and they could help my grandparents while I’m at school. Me watching this youtube video I realized that anyone can learn more bout cybersecurity at…
Module 12
Review what the author says and write a paragraph describing the five most serious violations and whyyou think those offenses are serious. The five most serious violations that the Author wrote about are using unofficial streaming services, using torrent services, using copywritten images, and sharing passwords. Unofficial streaming services are when you can watch, stream,…
Module 10 – Article review
My summary of this article is that they talk about how cybersecurity ties into wars with other countries over information is a huge thing right now and also is leading to less trust within our governments all over the world. They talk about how wars are started by hacking to gain more information to use…
Module 8 Journal Entry
In movies they make hackers to be very smart, nerdy, skinny when hackers can look like any one. They also make the computer screen of a hacker look like a big 3D circle. Movies make hacking more complicated than it really is with the 3D circle. In one of the movies they shown on the…
Journal Entry 7
https://imgflip.com/i/746leq I generated this mem through Meme Generator – Imgflip. Creating this meme was fun for me because this assignment allowed me to be able to express my goofy side a little bit. This assignment was about system integration. System integration is the process of uniting all virtural and physical components into a single cohesive infrastructure…
Journal entry 6
Can we create three fake websites and three real websites and ask them to spot what makes them fake? Yes, we can because we can verify them using a site seal to check to see if their site is authentic or not. We have to be careful with fake sites because they can get your…
Jounal entry 5
Entertainment- 5 Political- 6 Revenge- 7 Boredom- 4 Recognition- 1 Entertainment I ranked a 5 because people in our generation do certain things just to get some type of entertainment to mess with someone or hack them just because they can. Political I ranked a 6 because politicail leaders of the United States do things…
Discussion Board 4
Post a comment in the discussion board answering the question:“Apply the phrase victim precipitation to cyber victimization” andrespond to two other students’ posts. Victim Precipitation thoery suggests that the characteristics of the victime precipitate the crime. Cyber Victimization is the process in which others are victimized through the use of information and communication technologies. When…
Journal Entry 3
Module 4 Review Maslow’s Hierrachy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. The first level would be for older people because they are Digital Immigrants and some don’t know how to work their phones or the internet….
Journal Entry 2
Module 3 Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers can use this cite to see and do research on different types of breaches. They can also see the different types of breaches to help out…