The media holds an overarching influence among society and therefore, their perception on cybersecurity impacts how society views it. It creates an unrealistic view of the true dangers of cyberattacks and does not address key aspects like target hardening. Also… Continue Reading →
The relationship between Human Systems Integration and the meme presented below is in an indirect relationship. Human Systems Integration is the relationship between the human and the user operational environment and how the system is designed to that relationship. This… Continue Reading →
Identifying fake websites from real, authentic websites may seem as a common practice in today’s growing technologically literate society however, these fake websites can be deceiving if not properly recognized. Fake websites can be identified through a lieu of ways…. Continue Reading →
https://doi.org/10.1093/cybsec/tyae002 Introduction As the technological spectrum continues to grow and flourish it also opens a pandora’s box of uncharted territory of threats against the U.S. The article attempts to explore the tip of the iceberg of technological challenges by… Continue Reading →
Individual motives include entertainment, political, revenge, boredom, recognition, for money, and multiple reasons. To rank these motives from 1 which makes the most sense to 7 the least in my opinion I would rank them: 1. Multiple reasons, 2. For… Continue Reading →
Maslow’s hierarchy of needs suggests that all humans have needs that exist on a hierarchical scale. The idea is built upon that as the lower level needs are met our focus shifts to meeting the upper levels of needs. His… Continue Reading →
https://privacyrights.org/ To begin to analyze the information on data breaches it is best to understand how data breaches are defined by researchers. It is defined as the unauthorized acquisition of computerized data the compromises the integrity, and security of personal… Continue Reading →
Principles of science such as relativism, objectivity, and parsimony are just a few of an array of scientific principles. These 3 in particular I am going to relate to the concept of cybersecurity. Firstly, the principle relativism is defined as… Continue Reading →
https://niccs.cisa.gov/workforce-development/nice-framework When reviewing the NICE Workforce Framework I found that some of the variety of career specialty areas are intriguing and could be a possible focus for a career. The protect and defend category was the first that personally stuck… Continue Reading →
© 2025 Cameron Mclaurin — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑