When searching for fake websites I decided to look towards the gaming community. Most games are advertised to children and they have in-game purchasable items. Roblox is a great example of this. The platform is mostly made of children and has a virtual currency called Robux used to buy in-game items like outfits and emotes….
Motivation Scale
EntertainmentTom Liner said he did it for fun and money. I rate this a 5. It is somewhere in the middle for me because greed is dangerous. However, he did not need this money. He just wanted to have a laugh and make a little money as well. PoliticalI rate this a 4 because it…
Affects of Technology on the Hierarchy
Physiological: Technology somewhat affects my physical state. When playing video games I can forget to eat or drink. It also affects my sleep. I usually go to bed very late at night and end up only getting a few hours of sleep before work. This, however, does not make me feel any different when on…
Data Breaches and Security
When large industries or even small ones with good security expose how data breaches were executed on their company it allows researchers to understand where exactly their security might be lacking. Human error can be a big part of data breaches so mainly double checking behind others can increase security. Also trying the same methods…
Cyber Securities Scientific Principles
The principles of science and cybersecurity have a close relationship. Firstly computers were made using the principles of science, hypothesis, research, and experimentation. In cybersecurity we can use those same principles to test the vulnerability of websites, apps, games, and more. There is no limitation to how many experiments can be done in cybersecurity because…
Workforce Focus
Out of the seven categories of NICE Workforce Framework for Cybersecurity the one I would want to focus on for my career is Investigation (IN). I would like to develop my skills in putting together puzzles for cyber crimes. Being able to go through and figure out where and when an event occurred is something…
Infrastructure Systems vs SCADA Applications
Infrastructure System ThreatsInfrastructure systems, like water supply, communication, and transportation networks, are essential but face several threats. Cyber attacks can cause serious disruptions, potentially shutting down entire cities. Human mistakes and system failures can also lead to big problems. Natural disasters, such as severe weather, can knock out power to crucial buildings like schools and…
CIO Budget Control
Technology The budget would be a 55%-45% split with 55% being for the technology and equipment used on the job. It is very important to have the latest equipment when dealing with cyber security or anything to do with running programs. There is no room for error when protecting a website or big corporation from…
The CIA Triade and Security
CIA TriadeThe CIA Triade includes Confidentiality, integrity, and availability. Confidentiality is another form of privacy. When you want to keep something confidential only a certain group of people know this information or none at all besides yourself. There are usually high measures in place to keep the information confidential. Depending on the type of information…