CYSE 201S Journal 5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 

I picked political as 1 because it makes the most sense to me, because hackers can do things in the political atmosphere that could drastically change the lives of many, like altering election results. I picked for money as 2 Continue reading CYSE 201S Journal 5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 

CYSE 201S Journal 4: Review Maslow’s hierarchy of needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need

Maslow’s hierarchy of needs relates to my experiences with technology in the sense that there are certain technologies that I need everyday and all the time, and there are some that are not as important to me. At the very Continue reading CYSE 201S Journal 4: Review Maslow’s hierarchy of needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need

CYSE 201S Journal 3: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least

One of the areas that appeals to me is Protect and Defend. It appeals to me because it doesn’t seem as technical as the other areas, as you primarily are just analyzing events such as cyber threats and attacks. Another Continue reading CYSE 201S Journal 3: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least

CYSE 201S Journal 2: Visit https://privacyrights.org/data-breaches to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

This website can provide researchers with a lot of information on data breaches. It includes information regarding the most common types of cybersecurity breaches. It also includes a list of organizations with the most breaches, as well as a graph Continue reading CYSE 201S Journal 2: Visit https://privacyrights.org/data-breaches to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

CYSE 201S Journal 1: Explain how the principles of science relate to cybersecurity

There are several principles of science that relate with cybersecurity, including relativism, objectivity, parsimony, skepticism, ethical neutrality, and determinism. Relativism can be understood to mean that all things are related in some way. Some ways that cybersecurity and relativism are Continue reading CYSE 201S Journal 1: Explain how the principles of science relate to cybersecurity

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? (journal 13)

There are many different ways to approach the development of cyber-policy and infrastructure. One approach to the development of cyber-policy and infrastructure would be focusing on a risk-based strategy that will identify and prioritize infrastructure, critical assets, and systems. This Continue reading How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge? (journal 13)

How does cyber technology impact interactions between offenders and victims? (journal 12)

Cyber technology has impacted interactions between offenders and victims in many ways. One of which being that cyber technology has provided a new channel for harassment and stalking. Victims’ movements can now be tracked by stalkers, and in addition to Continue reading How does cyber technology impact interactions between offenders and victims? (journal 12)

What is the overlap between criminal justice and cybercrime? How does this relate to the other disciplines discussed in class? (journal 11)

Criminal justice and cybercrime overlap in several key areas. One of which being the investigation of cyber crime. Law enforcement agencies ,like the police or FBI, all have specialized units that investigate cybercrime, and they typically work together to hunt Continue reading What is the overlap between criminal justice and cybercrime? How does this relate to the other disciplines discussed in class? (journal 11)

How do engineers make cyber networks safer? (journal 10)

There are many different ways that engineers have made cyber networks safer. One way they make cyber networks safer is by conducting risk assessments. Risk assessments help engineers identify vulnerabilities in a system, and can help engineers understand how a Continue reading How do engineers make cyber networks safer? (journal 10)

Three ways that computers have made the world safer and less safe. (journal 9)

Computers have made the world a safer place, while at the same time making the world unsafe. One way computers have made the world better is through healthcare. Thanks to computers, we have better health records, better treatment and diagnosis, Continue reading Three ways that computers have made the world safer and less safe. (journal 9)