Introduction In today’s age, Artificial Intelligence is ever growing and can be seen in many aspects of life. You see it within smartphones and other devices, social media, finances, customer service, and many other parts of everyday life. AI has also made an appearance within our crime prevention agencies and has helped the process of…
Career Professional Paper
Seth Santiago Old Dominion University 04/07/2024 Introduction A Cybersecurity Penetration Tester, or ethical hacker, plays a critical role in an organization’s security and defense strategy. While understanding the techniques and different ways of hacking are essential to this job field, understanding human behavior and psychology is equally important for effective testing. In this paper, we…
Journal Entry 14
The five most serious violations that internet users do are bullying and trolling, recording a VoIP call without consent, faking identity online, collecting information about people younger than 13, and sharing passwords, addresses, or photos of others. I believe that bullying and trolling individuals online and in person is wrong and is rightly-so an illegal…
Journal Entry 10: Social Cybersecurity
Social cybersecurity is a new area of national security that deals with how technology affects human behavior and society. It produces information and is using it to manipulate beliefs and divide societies. Unlike traditional cybersecurity, which focuses on protecting technology, social cybersecurity is about understanding and countering how people use technology to influence each other….
Journal Entry 5: Ranking Motives
In cyber crime, there are several reasons that motivate individuals to commit them. Individuals might commit crimes over the internet for entertainment purposes, political reasons, revenge, recognition, for money, boredom, or even for multiple reasons. The way I would rank them from making the most sense to least sense would be for multiple reasons, money,…
Journal Entry 4
As it explains in Maslow’s Hierarchy of Needs, there are five different levels in a pyramid style diagram. At the base of the hierarchy there is the most basic necessities, such as food, water, shelter, and sleep. In my experience with technology, access to digital infrastructure and resources such as the internet, and the heating…
Journal Entry 3: Data Breaches
In today’s age, there are more threats to us on the internet than there has ever been before. The world of data breaches, viruses, and other malware is constantly growing and evolving on a day to day basis. These data breaches have been documented and serves as a valuable resource on PrivacyRights.org. Researchers are able…
Journal Entry 2
The principles of science are crucial to the field of cybersecurity and have influenced the framework for understanding, addressing, and adapting to the challenges cyber threats pose. The principles of science provide a solid foundation for individuals to analyze information, make sounds evidence based decisions, and to continue to improve upon systems and software. By…
Journal Entry 1: NICE Workforce Framework
After reviewing the areas of NICE workforce framework I would like to focus more on operating and maintenance. I would like to focus more on this because I would like to troubleshoot and address problems that individuals experience throughout the workforce. I am least interested in focusing on overseeing and governing systems and networks. This…