Samael Pamie-GeorgeProfessorArticle Review #1 (MLA Format)2/11/2024 Scholar Journal ReviewThe first article to be dissected is Indonesian Land Rights for Individual Limited Companies.Written by Habib Adjie from the Universitas Narotama, Surabaya, Indonesia. The Indonesian LandRights for Individual Limited Companies Scholar Journal explores the complex legal frameworkgoverning land rights of individual limited companies (ILCs) in Indonesia. The…
Author: spami001
Week 7 – Journal Entry 7
Meme 1 – https://unsplash.com/photos/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8 : You just successfully blocked a hacker from collecting data. Meme 2 – https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs : Looking at the main data base being attacked but it wont effect anything because you see it in first hand. Meme 3 – https://unsplash.com/photos/person-sitting-front-of-laptop-mfB1B1s4sMc : How it is typing up a ton of codes and protection…
Journal Entry 5
” Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. “ To begin,…
Week 4 Journal Entry
“Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.” Well, first it would be right to state each level before stating how it relates to ones experience with technology. So, what are the very…
Week 3 – Journal Entry 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. After a look at the website, PrivacyRights.org, the way researchers can use this information to study breaches is evident. To begin, breach patterns. Researches can break down…
Week 2 – Journal Entry 2
Explain how the principles of science relate to cybersecurity. Whilst one would like to explain that which is the relations of the principles of science and the correlation to cybersecurity, let them first be defined. To no one’s surprise, the principles of science is, test of all knowledge is an experiment. Cybersecurity, by definition, is…
Week 1 Journal Entry – NICE Workforce Framework
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. Note: Word count should be in between 100 -150 words. Upload all your journal entries into your ePortfolio and submit the link…
Journal #7
Well, it shapes the dynamic of how these crimes are committed, what the type of offensives are, and the consequences. 2. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? One should approach the development of cyber policy strategically, adaptively, with a multifaced approach.
Journal #6
This can be answered with one word, cryptography, the art of solving or writing codes. First, one should define what authenticity and integrity are. Authenticity is, very simple, a quality of being authentic. Integrity is the quality of being honest or unity depending on context. Now, what is cryptography? One who knoweth not about this…
Journal #5
Well, this answer can vary from a list of reasons such as an Up to date software operating system, antivirus and antimalware software, strong passwords and multistep authentications, safe browsing habits, firewall protection, encryption, data backup, secure WIFI connection, regular scans and maintenance, and avoiding public WIFI for sensitive activities. 2. Describe three ways that…