mharr035 wrote: Career Paper
(More) | |
After reading the article "11 Illegal Things You Unknowingly Do on the Internet" what I believe to be the top 5 serious out of the list and my reasoning behind it is below: Illegal Searches on the Internet - Illegal searches on the Internet (More) | |
The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometim (More) | |
An economic theory used within the data breach notification is laissez-fare theory. The theory believing that government shouldn’t interfere with the economy unless to protect an individuals inalienable rights. With the breach resul (More) | |
In the video, I noticed that she mentioned gaining experience in a multitude of different ways. Whether it be from school, church, or seeking an entry-level job. Lifelong learning was mentioned in some form by making sure to collect or learn a certa (More) | |
I see this field as an essential aspect of national security for the United States. With its focus on understanding and planning around behaviors that might arise from social, political, or cultural scenarios, its uses to assist with safety are endl (More) | |
mharr035 wrote: Article Review #2: An Unhealthy Take on Cybersecurity
Almost everyone at some point in their life has a need to go to a hospital or medical care facility. In most cases, before the care can be administered or the issue(s) documented in a patient record, personally identifiable information provided by t (More) | |
Although cybersecurity can be a complex and difficult field to work in, its role within movies or TV shows seldom displays the true nature in which cybersecurity tasks are completed. In doing so, the perception of cyber threats, hackers, and securit (More) | |
The meme relates to human systems integration by having an organization host a training session on topics that will educate employees on multiple issues that will influence better cybersecurity practices throughout the organization after an empl (More) | |
When I am trying to identify if a website is fake, the first thing I will do is confirm the URL. Are there any slight variations in the spelling, double letters, extra numbers? With most legitimate sites, they are now using encryption and certifica (More) | |
mharr035 wrote: Rank the motives you think make the most sense on a scale from 1 to 7, and explain why you ranked each motive the way you ranked it. (Week 5)
For Money - This motive makes the most sense as in the day in age, money makes the world go round. Those that don't have it want it, and those that have it, want more of it.
Political - This motive can be very impactful for the perpetrators, g (More) | |
mharr035 wrote: Explain how each level of Maslow’s Hierarchy of Needs relates to your experiences with technology. (Week 4)
Maslow’s hierarchy of needs is a psychological theory proposed by Abraham Maslow in 1943 that suggests human beings have needs arranged in five levels. The theory states individuals would need to satisfy lower level needs before they can focus on (More) | |
mharr035 wrote: How might researchers use Privacy Right's pubilicly available information to study data breaches? (Week 3)
Researchers that are seeking to study data breaches can use Privacy Rights as a source of knowledge in a multitude of ways. Firstly, the frequency and scale of breaths can be seen when looking through “The Chronology”. The data source is fed fro (More) | |
The 6 principles of science, Determinism, Empiricism, Ethical neutrality, Objectivity, Pasimony, and Relativism can be related in a variety of ways to cybersecurity. Determinism is of the mind that behaviors are the result of preceding events. S (More) | |
aberr019 wrote: Journal Entry 15
Watching Davin Teo's TEDx talk on digital forensics was truly inspiring. His journey to his career in cybersecurity and forensics wasn't linear, but it was a testament to his curiosity and determination. Initially, he seemed to be just a young perso (More) | |
aberr019 wrote: Journal Entry 14
Among the violations from the clario.co blog article "11 Illegal Things You Unknowingly Do on the Internet", several are particularly serious due to their legal, ethical, and personal consequences.
Using Unofficial Streaming Services: This often (More) | |
aberr019 wrote: Journal Entry 13
This article examines the concept of bug bounties, a technique companies use to contract hackers to discover bugs and weaknesses in their systems’ infrastructure. This method of beefing up security is beneficial for a company by providing a cheape (More) | |
aberr019 wrote: Journal Entry 12
The sample data breach notification relates to the cost/benefit analysis and Laissez-fare economic theories. Cost/benefit analysis can be applied as the business chose a service provider and the cybersecurity offered, weighing the cost of other pote (More) | |
aberr019 wrote: Journal Entry 11
Social themes that were raised during the Cybersecurity Analyst job outlook video that directly related to the job itself were outlined in the broad descriptions of the day-to-day work. She highlighted many of the junior tasks, in respect to entry l (More) | |
aberr019 wrote: Journal Entry 10
The article "Social Cybersecurity: An Emerging National Security Requirement" by Lt. Col. David M. Beskow and Kathleen M. Carley discusses the growing importance of social media platforms in national security. The authors highlight how cyber threats (More) |