Tags » cyber

Posts
The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometim (More)
I see this field as an essential aspect of national security for the United States. With its focus on understanding and planning around behaviors that might arise from social, political, or cultural scenarios, its uses to assist with safety are endl (More)
Almost everyone at some point in their life has a need to go to a hospital or medical care facility. In most cases, before the care can be administered or the issue(s) documented in a patient record, personally identifiable information provided by t (More)
When I am trying to identify if a website is fake, the first thing I will do is confirm the URL. Are there any slight variations in the spelling, double letters, extra numbers? With most legitimate sites, they are now using encryption and certifica (More)
For Money - This motive makes the most sense as in the day in age, money makes the world go round. Those that don't have it want it, and those that have it, want more of it.  Political - This motive can be very impactful for the perpetrators, g (More)
Maslow’s hierarchy of needs is a psychological theory proposed by Abraham Maslow in 1943 that suggests human beings have needs arranged in five levels. The theory states individuals would need to satisfy lower level needs before they can focus on (More)
Researchers that are seeking to study data breaches can use Privacy Rights as a source of knowledge in a multitude of ways. Firstly, the frequency and scale of breaths can be seen when looking through “The Chronology”. The data source is fed fro (More)
mharr035 wrote: Week 1 - Journal Entry
The NICE workforce framework has a plethora of career specialties that I find appealing to work in. Previous positions I've held and found enjoyable align with the Oversight and Governance work role category, specifically systems security management (More)