ltupa001 wrote: Software Development: Career Paper
Job Description
According to National Initiative for Cybersecurity Careers and Studies, a Software Developer “develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility prog (More) | |
ltupa001 wrote: To be or not to be legal?
Andriy Slynchuk wrote a blog about 11 Illegal Things You Unknowingly Do on the Internet.
Image from https://clario.co/blog/illegal-things-you-do-online/
Out of 11 things, the five most serious cases would be Using Unofficial Streaming Services (More) | |
ltupa001 wrote: Getting paid to hunt bugs?
A bug bounty is a program hosted by various companies to locate vulnerabilities affecting the software and end user. The "bugs" varies from different levels. For example, some bugs can have a high vulnerability risk, whereas a minor bug only affects (More) | |
ltupa001 wrote: CyMeme
*Panicking programmer noise* (Note: I made the meme from a website, but they put their watermark)
Human system integration is based on human action. So programmers and developers have a hard time figuring out what the user needs and utilizing the (More) | |
ltupa001 wrote: Social Cybersecurity: An Emerging National Security Requirement
Social cybersecurity is a growing risk for future warfare. Social cybersecurity is ‘humans using technology to “hack” other humans.’ The purpose of social cybersecurity is to disrupt the trust between the government and the people. It is als (More) | |
ltupa001 wrote: Cybersecurity Analyst About Social Behaviors
A cybersecurity analyst is an entry-level job that requires employees to monitor the network, respond to incidents, help with IT issues, and more. An employer's ideal employee would be a person with an outstanding resume and certifications such as C (More) | |
ltupa001 wrote: Social Media Disorder Scale
Social Media Disorder Scale by PsyToolkit
I scored 2.0 on the Social Media Disorder (SMD) Scale when I took the test. I find the questions to be quite interesting. Some questions were about social life, and some were about personal feelings. Some (More) | |
ltupa001 wrote: How Real Is Hacking In Media?
Media can change people's perspectives without a doubt. They can tell stories that are neutral or biased. They are a crucial factor when communicating technology to society. They can change the viewpoint of society from one point to another. For exa (More) | |
ltupa001 wrote: Spot the Difference: Real Website VS. Fake Website
Question: Can we create three fake and three real websites and ask them to spot the difference?
Short answer, yes.
It is pretty easy to duplicate a website with the right tools. However, it's not always easy for people who do not have technica (More) | |
ltupa001 wrote: Ranking Hacker's Motives
Multiple ReasonFor moneyRecognitionEntertainmentBoredomPoliticalRevenge
Multiple reasons can be a combination of different motives, and I think it's what motivates hackers. They hack to gain recognition while earning money. Furthermore, I put mon (More) | |
ltupa001 wrote: Maslow’s Hierarchy of Needs
Instruction
Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Then, give specific examples ofhow your digital experiences relate to each level of need.
What is Maslow’s Hierarchy of N (More) | |
ltupa001 wrote: Researchers: Using Publicly Available Information
People are entitled to know when their information has been leaked. PrivacyRights.org sets the standard for notifying people when a data breach has occurred. Not telling people can lead to the identity theft of users. Information spreads fast over t (More) | |
ltupa001 wrote: Cybersecurity: Relation to Principles of Science
Instruction: Explain how the principles of science relate to cybersecurity
Relativism
Relativism states that everything is related. However, for cybersecurity, as technology's development continues, people's lives are affected. It can be a goo (More) | |
ltupa001 wrote: Career Interest with NICE Workforce Framework
There are many areas that I want to focus my career on; however, I think that I can't get through all of them. However, what I like the most is the technical, hands-on stuff, and it allows me to think critically. From the NICE Workforce Framework, I (More) | |
ltupa001 wrote: Article Review: Security Information Sharing
how the topic relates to the principles of the social sciencesthe study's research questions or hypothesesthe types of research methods usedthe types of data and analysis donehow concepts discussed in class relate to the articlehow the topic relates (More) |