Journal 6

Instructions: Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent. Note: Don’t generate or click on unwanted/fake websites on your web  browsers. Use examples from your…

Journal 5

Instructions: Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. My number one…

Journal 4

Instructions: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of needs relates to my experiences with technology through multiple ways. Physiological needs by having health tracking apps to help monitor my…

Journal 3

Instructions: Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Information on data breaches can be used to aid researchers by offering a valuable opportunity for analysis and insight. This can be done by examining trends over…

Journal 2

Instructions: Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity? The principles of science provide a structured way to both view and develop the field of cybersecurity. Objectivity in cybersecurity can be seen through the data collected and examined by data analysts to help identify trends and differences without bias…

Journal 1

Instructions: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)Links to an external site.The word count for the journal entries and discussions should be…

Article Review #2

“Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK” Introduction             The research article “Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK” by Jain, Hrle and Woods, investigates how well home and cyber insurance policies protect…

Article Review #1

“Understanding the Use of Artificial Intelligence in Cybercrime” Introduction In the article “Understanding the Use of Artificial Intelligence in Cybercrime” by Sinyong Choi, Thomas Dearden and Katalin Parti, it explores the effect of artificial intelligence (AI) on cybercrime, victimization and methods of prevention. This review intends to analyze the ways in which this article relates…

SCADA Systems

Critical Infrastructure systems such as waste and water management, power plants, electricity and transportation are foundational to our society. However, with the development and reliance on technology, has made them a growing target of cyberattacks. These offenses can cause irreparable and long-lasting damages if their vulnerabilities were to be exploited. Supervisory Control and Data Acquisition…

The CIA Triad

The CIA triad – Confidentiality, Integrity, and Availability – is a foundational model used within Information security that acts as a guide to create security systems or methods. Authentication and Authorization are important components of this foundation. With authentication ensuring that only verified users can access systems and authorization, they only access resources they need…