josbo012 wrote: Journal 14
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Using unofficial Strea (More) | |
lkopa002 wrote: CYSE 200 T Entry #4
1. What are the costs and benefits of developing cybersecurity programs in business?
The digital age has made cybersecurity a crucial concern for businesses of all sizes. With the increasing number of cyber threats and data breaches, compani (More) | |
josbo012 wrote: Journal 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a companyâ (More) | |
josbo012 wrote: Journal 12
https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf
Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. (More) | |
lkopa002 wrote: CYSE 200 T Entry #3
How has cyber technology created opportunities for workplace deviance?
Cyber technology has revolutionized how we work and communicate, providing numerous benefits such as increased efficiency, flexibility, and connectivity. However, it has also (More) | |
lkopa002 wrote: CYSE 200 T Entry #2
1. Describe four ethical issues that arise when storing electronic information about individuals.
Storing electronic information about individuals can pose several ethical issues. One major issue is the potential for breaches in security, which c (More) | |
josbo012 wrote: Journal 9
Complete the Social Media Disorder scale.
How did you score?
What do you think about the items in the scale?
Why do you think that different patterns are found across the world?
While I answered no to all 9 questions, I can think of time (More) | |
lkopa002 wrote: CYSE 200 T Entry #1
Why are you interested in cybersecurity technology?
One reason why I am interested in cybersecurity technology is because it can help me protect my personal information and online identity. For example, by understanding how to create strong passwo (More) | |
josbo012 wrote: Journal 8
Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? - YouTube
• After watching the video, write a journal entry about how you think the media influences ou (More) | |
josbo012 wrote: Journal 7
• Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals†(More) | |
josbo012 wrote: Journal 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
Note: Don’t access/generate or click on any unwanted/fake websites on your web browsers. Showcase with (More) | |
josbo012 wrote: Journal 5
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Multiple Reasons (More) | |
josbo012 wrote: Journal 4
Review Maslow’s Hierarchy of Needs and explain how each level
relates to your experiences with technology. Give specific examples of
how your digital experiences relate to each level of need.
Self-Actualization: The feeling of working tow (More) | |
josbo012 wrote: Journal 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
While it may be impossible to kno (More) | |
josbo012 wrote: Journal 2
Explain how the principles of science relate to cybersecurity
The principles of science help objectively locate and fix potential security issues by studying not only social behavior but by gathering un biased data that helps to form understandin (More) | |
josbo012 wrote: Journal 1
Review the NICE Workforce Framework. Are there certain areas that you
would want to focus your career on? Explain which areas would appeal
the most to you and which would appeal the least.
I enjoy troubleshooting problems when they arise, s (More) |