Cybersecurity and economics have a close-knit relationship with each other. Cybersecurity can prevent substantial losses and ultimately promote economic growth. Economics is an essential aspect of cybersecurity because it helps with security investments, risk management, and cost-benefit analysis. Certain organizations rely on economics to determine how much to invest in cybersecurity in order to keep…
Author: sfran037
Discussion Board #8
Social engineering attacks are becoming more advanced all over the world. Cyber attacks that utilize social engineering include phishing, deepfakes, spear phishing, and watering hole attacks. Cybercriminals are able to implement such attacks by taking advantage of an individual’s sense of security and trust and gaining access to their personal information by posing as a…
Discussion Board #7
The 12-year-old cybersecurity expert, Reuben Paul, successfully demonstrated common security risks people encounter daily. For example, he used a public Wi-fi network to steal the interviewer’s Twitter login after he connected to the network. This scenario reminds me of the content in Module 6, which discusses cybersecurity awareness, perceptions, and safety. The content also states…
Discussion Board #5
One theory that I believe best explains cybercrime is Sigmund Freud’s Psychodynamic Theory. The Psychodynamic Theory suggests that an individual’s past experiences can influence their behavior in the future. To tie this into the cyber world, think of a little kid getting bullied through online games. The trauma from the bullying could stem from them…
Discussion Board #4
Victim precipitation refers to the actions or characteristics of an individual that can potentially lead to them becoming victimized. When it comes to victim precipitation, many blame the victim for allowing themselves to be affected by said attacks, but it is not their fault. The purpose of victim precipitation is simply to understand what behaviors…
Discussion Board #3
Some ways to reduce human error include maintaining strong passwords, regularly training employees on proper security measures, utilizing multi-factor authentication, and performing regular security audits. Having a weak or reused password is relatively common and, in some cases, leads to those passwords being compromised and any important information contained within those accounts being free for…
Discussion Board #2
For starters, determinism is a principle that acknowledges all behaviors as resulting from previous actions or events that are predictable. The principle of determinism relates to computer hacking because it is a predictable action of an individual with malicious intent who deliberately accesses a computer system using tools they purposefully acquired. These cyber attackers always…
Discussion Board #1
Hello, my name is Sharice Francis, and I am a sophomore majoring in Cybersecurity. I’ve taken a few online classes throughout the semesters, so I understand how they work. I haven’t had an internship yet, but it is recommended for my major, so I will eventually have one. I have created a WordPress ePortfolio since…
Journal Entry #13
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? It is known that cyber threats are constant and varying in severity. That said, we do not know what threats may or may not occur. As the “short arm” of predictive knowledge implies, our ability to predict and…
Journal Entry #12
How does cyber technology impact interactions between offenders and victims? The use of cyber technology allows for all sorts of cybercriminals to find their victims and carry out their attacks easily. From cyberbullies and cyberstalkers to hackers and scammers, the online world allows these individuals to remain mostly anonymous. It is challenging for them to…