Journal 7
In this journal I made 3 memes that I believe I could centralize the most around human center cyber security. Meme #1 This goes with Human Based security as one thing humans do security wise is sift through the spam mail then trash what’s unneeded. Doing this often can keep you from unnecessary phishing that’s found in emails. Meme #2 Social media is a big thing when it comes to human security, since social media is free to everyone with little to know filter to stop people from stealing your personal info. It’s your job condese time spent on social media to better protect...
Read MoreJournal 6
Victoria Sanderson2/14/2024 For this Journal it revolves around how to tell between fake vs real sites while surfing the web. Of course while you may be looking for a certain site on the web you come across a look a like that’s not actually the real thing. I remember as a kid looking for mods to mod my games and you can come across a site that looks slightly different then what you are used too. There are several misspellings, the name is wrong, even the URL is red where the log should be. Fake sites: Zorasoul.com – fake clothes site, used to steal credit card information...
Read MoreJournal 5
The journal reviews over the individual motives people have when it comes to committing crimes. each motive consists of entertainment, political, revenge, boredom, recognition, money, or multiple of these reasons. Multiple reasons – I believe if you have multiple reasons to commit a crime you have a stronger motivation and reasoning then others that might commit the same crime. Money – Money can be scarce or maybe the person is greedy, either way money is a big factor. revenge – This occurs if something happened that made you want to commit the crime meaning they had reason...
Read MoreArticle Review #1
Victoria Sanderson2/8/2024 Mitigating Risk in the Supply Chain Going through articles listed, I decided to choose the research article titled “Mitigating Ransomware Risks in Manufacturing and the Supply Chain: A Comprehensive Security Framework” by Abdulaziz Aljoghaiman. This article discusses various types of data, research methods, contributions, and questions addressed in the study. With this journal it aims to provide an overview of all those aspects of the article. To start off, it’s to mention the research questions addressed in this study revolve around understanding the...
Read MoreJournal Entry 4
This Journal entry is about “Maslow’s Hierarchy of Needs”, which is a model that divides into 5 stages. These stages are physiological needs, safety needs, love and belonging, Esteem, and Self- actualization. When talking about technology I can say that each one does fit my experiences with tech. Physiological needs – Like my basic needs, I believed when I first started using an ipod for music I was gonna need it for the rest of my life which I have since I was 3. safety needs – For this, the first thing that comes to mind is security cameras, because my family...
Read MoreJournal Entry 3
While reviewing the site Privacy Rights I noticed it had a lot of useful information to keep your personal information safe. It also listed info about data breaches that happened in 2023, that right there is enough to keep people informed of what been happening in the IT world. This little bit of information teaches them what to look out for and how to minimize the problem. The website is very diverse in it’s choosing as its not just breach notifications its also pointers on how to help you with phishing attacks that can lead to a breach in your privacy. It also teaches you the...
Read MoreJournal Entry 2
Victoria Sanderson1/18/2024 Analyzing the chapter’s PowerPoint covering the 7 principles of science, this overviews the psychological aspects of cybersecurity. While skepticism, implying some knowledge is impossible, seems least crucial for cybersecurity because the field demands acknowledging potential threats from unexpected sources. Ethical neutrality and relativism mirror understanding, crucial for comprehending one’s team in the cybersecurity field. Parsimony aids in understanding cybersecurity occurrences, as this advocates for the simplest fitting option. Objectivity aligns with...
Read MoreCYSE201S Journal entry 1
Victoria Sanderson1/13/2024 Reading over NICE workforce framework that overview cyber security fields, I have chosen three that fit in the criteria I’m working in and interests me for the future. The first one being Analyze, that is because that’s where I am now. I analyze networks for activity and isolate the problem if the situation is deemed necessary. The second one being investigated, because after I find the problem, I got to figure out why I need to isolate it. These two are the most important things in a cyber security career, I believe that’s the case because it was all...
Read MoreWrite Up – The Human Factor in Cybersecurity
When allocating limited funds for cybersecurity, it is important to consider training andadditional technology. Training is essential for ensuring that employees are aware of the latestsecurity protocols and can recognize potential threats when they arise. This will help them learnadditional technology, such as firewalls, antivirus software, and intrusion detection systems,which can help protect against malicious attacks.The best approach to balancing the tradeoff between training and additional technology isto allocate a portion of the budget to each. A good starting point would be to...
Read MoreDiscussion Post 2 (Ethical Gene Editing)
When It comes to Ethical Considerations of Gene Editing and bio cybersecurity it’s about the amount of information given and how important it is. Gene editing can be used for many ethical things such as changing birth defects from a child. In other words this can change human kind itself, if this could work all human kind could be “perfected”. If its possible to do that then there needs to be some sort of protection, this is because many people would want to get their hands on this sort of data. That is when Cybersecurity comes in to protect the systems data that will keep...
Read More