SCADA systems Supervisory control and data acquisition is a hardware and software system that gives access to industrial organizations to interact with sensors, motors valves, and everything else. SCADA system analyzes data from factories in real-time, which gives workers the ability to control things with better visibility. “The main thing about SCADA is that it…
Article Review 2
The next article I will be reviewing is, “Netflix as a Piracy Disruptor? A Cross-sectional Test of Accessibility and Affordability on Interest in Piracy,” by David Makin and Oliver Bowers. This article relates to social science because it looks at how people download movies legally and illegally. “The introduction of Netflix to a country has a…
Article Review 1
The article I will be reviewing is “Defining Cybercrime in terms of Routine Activity and Spatial Distribution: issues and concerns,” by Troy Smith and Nikolaos Stamatakis. This article relates to the principles of social science because they are studying the social, psychological, and economic effects of cybercrime. This article is a big debate by the…
Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?
After watching, “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” by Insider, I think the media influences our understanding of cybersecurity by making it look cooler and more fun than it actually is, is because these movies are just showing the most interesting part. Most of these cyber attacks…
Why Individuals Should Consider a Cybersecurity Career
Experiences in cyber security vary across multiple work roles. Sandra describes seven reasons why individuals should consider a cyber security career. Starting with job security in the years to come cybersecurity will still be around and there are not enough people to fulfill the jobs so you will be secure in your position. Next is,…
Ranking Individual Motives for Cyber Crimes
The motives for cyber offending crimes vary on the individual. I am going to rank them 1 through 7, from making the most sense to least. The number one reason I think people commit cybercrimes is because of money. This makes the most sense because you could literally make millions just by selling some valuable…
How The Insight From an Ex- Cyber Criminal can Help Answer Questions about Cyber Studies
The insight from a former criminal said that it is legal to go on the dark web and law enforcement does it all the time. Normal people can also access the dark web, so if a cyber security study is being done it is perfectly legal and ethical. Where things start to get strange though…
Is it ethical to study people in cyberspace when they don’t know they are being studied?
When looking at if it is ethical to study people in cyberspace when they don’t know you have to think about will they ever find out, how would they react if they found out and how many people know that you are studying one specific person. I stand with it is ethical to study someone…
Ann’s Cybersecurity Problem and Future cybersecurity help
Ann’s behavior is related to the need for cybersecurity because she was hacked. She clicked on a voucher and filled in all her information, but that voucher was fake, and they spent a lot of money on her account. The ways technology has changed it is easier to hack because you can preload all your…
Reviewing the NICE Framework
The National Initiative for Cybersecurity Education framework (NICE framework) is used as a reference to classify skill requirements and duties for cybersecurity workers. It analyzes threats from multiple sources. It helps provide a common definition for cybersecurity. The NICE framework is cut into seven categories and those are made up of 33 specialty areas, but…