Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Three simple examples of fake websites are: Three examples of real websites are: The first thing to examine when trying to tell if a site is legitimate is the domain name….
Journal Entry #7
Create a meme with one of the images given in the slides and explain how your meme relates to Human Systems Integration. Most organizations fail to center the issues presented with cybersecurity around the human factors. Organizations would benefit greatly if they have a human factors program where they partner with psychology-based professionals, cognitive scientists,…
ePortfolio Entry #6
How has cyber technology created opportunities for workplace deviance? Workplace deviance refers to behavior of an individual that violates the organization that they work for, often resulting in the harm of the organization. Workplace deviance can be classified into many different types of behavior and actions such as aggressive behavior, unproductive behavior, intentional abuse of…
Journal Entry #5
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. The seven different individual motives that were reviewed are: Entertainment, Political,…
ePortfolio Entry #5
Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. Consult in a cybersecurity firm YouTube videos containing cyber educational material and technical tutorials Become a speaker at different cybersecurity events Ethical hacking Research ongoing cyber threats and mitigation techniques Security Auditing Editor for security software development Create a…
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of needs lays out all of human’s need in a hierarchy. The theory states that once we meet our lower-level needs, humans tend…
ePortfolio Entry #4
Compare cybersecurity risks in the U.S. and another country. When examining cybersecurity risks throughout the world, it is no question that cyber crime spreads everywhere. In so many different countries, there are reports of many different cyber threats that each country is facing. Many studies have tried to examine the different risks amongst different countries…
ePortfolio Entry #3
Describe four ethical issues that arise when storing electronic information about individuals. When examining the ethics behind storing people’s information, there is a lot to consider. Four major issues that arise are: personal privacy issues, access right issues, different harmful actions, and liability. Personal Privacy As one can expect, one of the main concerns that…
Journal Entry #3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? When visiting PrivacyRights.org, the user is initially greeted with a chart of the United States that shows the amount of data breaches within a customizable timeframe. This figure also gives a key which…
Journal Entry #2
Explain how the principles of science relate to cybersecurity. When examining cybersecurity through a social science framework, the same principles that adhere to natural sciences also adhere to social sciences. Five of the main scientific principles are Relativism, Objectivity, Parsimony, Ethical Neutrality, and Determinism. Understanding each of these principles allows for the understanding of how…