Tags » Journal Entry

Posts
After reading the article "11 Illegal Things You Unknowingly Do on the Internet" what I believe to be the top 5 serious out of the list and my reasoning behind it is below: Illegal Searches on the Internet - Illegal searches on the Internet (More)
The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometim (More)
An economic theory used within the data breach notification is laissez-fare theory. The theory believing that government shouldn’t interfere with the economy unless to protect an individuals inalienable rights.  With the breach resul (More)
In the video, I noticed that she mentioned gaining experience in a multitude of different ways. Whether it be from school, church, or seeking an entry-level job. Lifelong learning was mentioned in some form by making sure to collect or learn a certa (More)
I see this field as an essential aspect of national security for the United States. With its focus on understanding and planning around behaviors that might arise from social, political, or cultural scenarios, its uses to assist with safety are endl (More)
Almost everyone at some point in their life has a need to go to a hospital or medical care facility. In most cases, before the care can be administered or the issue(s) documented in a patient record, personally identifiable information provided by t (More)
Although cybersecurity can be a complex and difficult field to work in, its role within movies or TV shows seldom displays the true nature in which cybersecurity tasks are completed. In doing so, the perception of cyber threats, hackers, and securit (More)
The meme relates to human systems integration by having an organization host a training session on topics that will educate employees on multiple issues that will influence better cybersecurity practices throughout the organization after an empl (More)
When I am trying to identify if a website is fake, the first thing I will do is confirm the URL. Are there any slight variations in the spelling, double letters, extra numbers? With most legitimate sites, they are now using encryption and certifica (More)
For Money - This motive makes the most sense as in the day in age, money makes the world go round. Those that don't have it want it, and those that have it, want more of it.  Political - This motive can be very impactful for the perpetrators, g (More)
Maslow’s hierarchy of needs is a psychological theory proposed by Abraham Maslow in 1943 that suggests human beings have needs arranged in five levels. The theory states individuals would need to satisfy lower level needs before they can focus on (More)
Researchers that are seeking to study data breaches can use Privacy Rights as a source of knowledge in a multitude of ways. Firstly, the frequency and scale of breaths can be seen when looking through “The Chronology”. The data source is fed fro (More)
The 6 principles of science, Determinism, Empiricism, Ethical neutrality, Objectivity, Pasimony, and Relativism can be related in a variety of ways to cybersecurity. Determinism is of the mind that behaviors are the result of preceding events. S (More)