There are several motives in regarding to making sense and impacting more than others. First making the least amount of sense is boredom. Boredom makes the least amount of sense to me because studies show that there is usually always… Continue Reading →
Abraham Maslow’s Hierchy of needs is a known phycological theory that outlines human needs in hierarchical structure. There are many ways that each theory can be assisted by technology. First you have the biological and physical needs, these are the… Continue Reading →
There are many factors that go into studying data breaches. Many data breaches are publicly available to see, researchers can use this information to study and gain knowledge from this. The researchers use this public information to study data breaches… Continue Reading →
The principles of science play a crucial role in cybersecurity to understand, develop, and better advancements in cybersecurity. Cybersecurity is considered a subset of computer science even though cybersecurity is its own field of study. Cybersecurity must abide by the… Continue Reading →
The areas in which I would want to focus and grow in for the NICE Workforce Framework would be in the protect and defend category. I feel as though the most interesting role in the protect and defend category is… Continue Reading →
I am an aspiring cybersecurity major at old dominion university and my hope is to get into a field that involves anything cyber related as it is my highest interest. For fun outside of school I play ice hockey with… Continue Reading →
Cyber security has a significant impact on interactions between offenders and victims. Cyber technology has enabled offenders to remain anonymous, have a major psychological impact on the victims, increase access to potential victims, communicate more easily, and exploit vulnerabilities. The… Continue Reading →
Security engineers play a crucial role in protecting computer and networking systems from cyber-attacks and any potential hacker. the engineers create new cyber networks and continually update them to protect any weak spots that they find. Engineers also install new… Continue Reading →
There are several ways to check if your computer is safe. The most common way to check is is to run a manual virus scan of your system with Microsoft Defender, Malwarebytes, or any other antivirus program. Be aware that… Continue Reading →
Cybersecurity programs are essential for any business to be able to protect their sensitive information and data, intellectual property, and industrial information systems from theft and damage attempted by criminals and adversaries. Some benefits of cybersecurity for your business is… Continue Reading →
© 2025 Jacob Butler — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑