Alyssa Pici's Eportfolio

Welcome to my Eportfolio

Page 2 of 3

Journal Article

In the Journal Article from the International Journal of Cybersecurity Intelligence and Cybercrime named “Understanding Deviance and Victimization in Cyber Space among Diverse Populations,” the author Insun Park explores the topic of cybercrime and victimization among different populations. The article… Continue Reading →

Journal Article

The Oxford Academy’s Journal of Cybersecurity has a Journal Article named Improving vulnerability remediation through better exploitation prediction. This Article explores ways the cyber community targets exploits by predicting malicious behavior before it happens. As the information security world is… Continue Reading →

Entry #5 (Individual motives)

What are the motives for Cyber Offending? I will be using the following articles to rank motivations for cyber offending. 1-7

CYSE 201 Entry #4

Maslow’s Hierarchy of Needs is a visual representation of the different levels between needs and wants throughout life. The levels hierarchy includes physiological, safety, belongingness/love, Esteem, and self-actualization needs. While these needs are very much present in our physical lives… Continue Reading →

CYSE 201 Entry #3

The site https://privacyrights.org/data-breaches provides researchers with accounts and reports of data breaches. Some of the breaches on the site include credit cards, portable devices, insiders, and physical breaches. A researcher can use these reports to develop an idea of how,… Continue Reading →

Entry #2

Explain how the principles of science relate to cybersecurity. Science is the study and analysis of theories. That principle can relate to cybersecurity in the sense that cybersecurity is trial and error. To prevent a hack a cyber professional must… Continue Reading →

Entry #1 Spring Semester

Review the NICE Workforce Framework.  Are there certain areas that you would want to focus your career on?  Explain which areas would appeal the most to you and which would appeal the least. The areas I want to focus my… Continue Reading →

Entry #7

 How does cyber technology impact interactions between offenders and victims? Before cyber technology, most interactions between offenders and victims happened in person, or at least in their physical environment. Now anyone from anywhere can attack someone through emails, phone calls,… Continue Reading →

Entry #6

What do engineers do to make cyber networks safer? Cyber engineers incorporate electrical engineering and computer science to understand cyberspace. They use skills developed in digital forensics, security policy and network defense to perform cybersecurity tasks, as well as work… Continue Reading →

Entry #5

How can you tell if your computer is safe? Computer safety can be complicated and hard to figure out. Due to malicious behavior including phishing scams, scam pop ups, and spyware the internet can be a scary place. However, your… Continue Reading →

« Older posts Newer posts »

© 2025 Alyssa Pici's Eportfolio — Powered by WordPress

Theme by Anders NorenUp ↑