Hacking Scenes in Movies Compared to Reality

            Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV series and movies and then having an actual professional in the cybersecurity field critique how realistic the scenes are. After viewing the…

Fake vs. Real Websites

One of the most common methods of gathering personal, sensitive information from the average user is the creation of fake websites. Websites that appear to be from package delivery services, such as FedEx or UPS, are an example. These scam attempts are often done through text messaging or emails, that state that there is an…

Maslow’s Hierarchy of Needs and Cybersecurity

Maslow’s Hierarchy of Needs is a theory used in the psychology field that states that human motivation to fulfill their needs is done in a hierarchical way. This theory provides five different levels of these needs, starting with basic needs like food and water and then continues to become more advanced until reaching the top…

Benefits of the Study of Data Breaches

The website PrivacyRights.org provides multiple diverse and publicly available articles that center around privacy laws and data protection. These articles can be of great use to researchers who want to understand more about data breaches and those developing privacy or security policies. By studying these breaches, researchers can assess the frequency of these breaches, along…

Application of the Principles of Science

In cybersecurity, the principles of science can be applied in multiple ways. The principle of parsimony centers around simplicity. When developing and testing methods of preventing malicious attacks in the cyber world, it is important to keep the principle of ethical neutrality in mind. The ways that these new preventative technologies should not negatively affect…

NICE Workplace Framework

I had never heard of the NICE Workforce Framework before this class, so it was really interesting to see the all the different categories of jobs in the cybersecurity field. After looking at the different areas, I would say I am most interested in the Design and Development area, since I am highly interested in…

Ranked Individual Motivators for Cybercrime

Given the following individual motives for cybercrime, I have ranked them, with the number one position being the one that, in my personal opinion, makes the most sense, and seven being the motive that makes the least sense: 1. Multiple reasons             – It is reasonable to assume that those committing cyber crimes would have…