Module 2 Explain how the principles of science relate to cybersecurity? Cybersecurity is an applied science. People use there scientific findings and discoveries and create things in the form of technology plateforms, apps etc. Some people use there scientific findings to hack or scam others and thats cruel and illegal.
2nd Discussion Board Entry
What do you think about the principle of determinism as it relates tocomputer hacking? With determinism we talked discussed in class these questions: • Why do individuals (choose to) commit internet fraud? •Why do individuals (choose to) engage in risky online activities?• Why do individuals (choose to) share their passwords?• Why do individuals (choose to)…
1st discussion Board post
Module 1 Describe the top three careers of social science graduates that youwould be interested in considering. What is it about those jobs thatyou find interesting? Respond to one other entry. The top three careers of socail science graduates that I would consider are: Political Scientist, Market Manager, and Sociology. A Political Scientist study political…
“Short Arm” of Predictive Knowledge
Cyber breaches are on the increase, making it more critical than ever for businesses to sit down and talk about their strategies and techniques. Aside from providing insurers in place to help mitigate the damage, developing such plans is difficult due to technology expanding. I would also have people…
Workplace Deviance
In today’s era, Cybersecurity is everything because we use the internet to hold and keep everything stored like our credit card information, Social Security number, Personal information, etc.. cybersecurity has created different opportunities for a lot of people by opening jobs, allowing many people to get nice incomes, etc. This has also allowed people…
What is the CIA Triad?
What is the CIA Triad? the Cia Triad stands for Confidentail, Integrety, Avalibility. The CIA Traid is actully a security model that has been developed to help people think aboout varios parts of IT. Confidentail means for Only authorized users and processes should be able to access or modify data. Integrety means for Data…
Cyber Security Job Hunt
The two jobs that interested me was Automotive Security Engineer and Bug Bounty Hunter because I really love engineering since I was really little and Bug Bounty Hunter just seemed interesting to me to hunt different viruses. Automotive Security Engineer- The disciplines for automotive security engineering include critical thinking, safety, architect, design, testing deployment, sustainment….