The online experience and Maslow's hierarchy of needs have a resounding correlation. The bottom tier, being physiological needs, is fulfilled by access to the internet via a device and a stable connection. Online security fulfills the safety tier. T (More) | |
madam038 wrote: Journal Post 3 - Research on Security Breaches
Using the data provided by the "Q1 Data Breach Report," I can see that the companies/organizations that are targeted the most are healthcare and business-related. This shows that these fields are not only important, but hold lots of data that could (More) | |
madam038 wrote: Journal Post 2 - Empiricism
Empiricism is an essential principle in any science, and in cybersecurity, it plays a critical role in enhancing protection. By analyzing patterns in user behavior and system data, security teams can identify potential threats and prevent cybercrime (More) | |
madam038 wrote: Journal Post 1 - NICE Framework interests
Oversight and investigation are the areas I am most interested in. Investigation seems very engaging as a career because of the problem solving and analysis elements. Oversight seems interesting due to the amount of roles I could play. A career in t (More) | |
qedmo001 wrote: Article 2 Review:
Quinn Edmonds4/10/25Professor YalpiCYSE201s
Article review #2 and Deepfakes ‘Deepfakes’ are AI trained videos or ima (More) | |
qedmo001 wrote: Article 1 Review
Quinn Edmonds2/26/25CYSE 201SProfessor YalpiArticle Review #1 Investigating the Intersection of AI and Cybercrime: Risks, Trends, andCountermeasures.By Shetty, S. , Choi, K. & Park
This article covers the concept of u (More) | |
qedmo001 wrote: Journal 15
https://youtu.be/Pf-JnQfAEew
He started in a small accounting field and needed a IT person to help. He then got more interested in IT and kept accounting. He got the opportunity to work for the first national digital forensics in Aus (More) | |
qedmo001 wrote: Journal 12
https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf It shows a good example of information of information asymmetry, the higher ups are the ones who know of the breach and not the public eye. It also show bad reputation from the c (More) | |
qedmo001 wrote: Journal 8
https://youtu.be/6BqpU4V0Ypk
I think media depicts cybersecurity as something insanely complicated and sometimes scary to get into. Some people hear the word hacker and get put off by that word and don't want anything to do with hacking (More) | |
qedmo001 wrote: Journal 7
(More) | |
qedmo001 wrote: Journal 6
This image shows that shortened URL's can be dangerous and may be a sign of a fake website.
Yet again the URL shows "pay-pail" which is a dangerous fake website that I myself personally would fall for. They can replicate every part of t (More) | |
qedmo001 wrote: Journal 4
Quinn Edmonds2/13/25CYSE201SProfessor YalpiWeek 4 Maslow’s Hierarchy of needs starts with basic survival needs. In cyberspace a lot of basicneeds people want is entertainment as we wont die without our computers. I n my personalexperie (More) |