Spring 2023
CYSE 201S || CYSE 200T || CYSE 301 || IDS 300W
// CYSE 201S
- Journal Entry 6 – Phishing WebsitesFake websites, or phishing websites as they are also known, are designed look like legitimate websites in an attempt to trick users into giving up sensitive information or downloading malware onto their system. These are some examples of commonly faked types of websites and how they can be spotted: It is important to note that … Continue reading Journal Entry 6 – Phishing Websites
- Journal Entry 5 – Individual Motives RankedIt can be difficult to rank motives for cybercrime as each individual’s motives are unique and subjective. This list is based off of examples that were discussed in class and the motives are ranked from most to least sensible.
- Journal Entry 3 – PrivacyRights.org and ResearchPrivacyRights.org is a website that provides information about data breaches. This information includes details about affected organizations, the types of data exposed, and the number of individuals the breach affected. There are several different ways researchers can utilize this website to study breaches. For example, researchers can use PrivacyRights.org as a data source while collecting … Continue reading Journal Entry 3 – PrivacyRights.org and Research
- Journal Entry 2 – Principles of Science as they Relate to CybersecurityThere are many ways that the principles of science can be relevant to cybersecurity. These principles can provide a useful framework for thinking about cybersecurity and developing effective strategies for ensuring the security of digital infrastructure and protecting sensitive data. By applying these principles, cybersecurity professionals can help ensure that their efforts are grounded in … Continue reading Journal Entry 2 – Principles of Science as they Relate to Cybersecurity
- Journal Entry 1 – NICE FrameworkThe NICE Framework, or National Initiative for Cybersecurity Education Framework, is a comprehensive guide that provides a common language and set of categories for describing cybersecurity work. This framework was designed to aid organizations in the process of identifying, recruiting, developing, and retaining their cybersecurity workforce. This framework consists of the following categories: Each category … Continue reading Journal Entry 1 – NICE Framework
// CYSE 200T
- Going on a Job HuntFor this discussion we were tasked with researching two jobs that interested us from this list: 50 Cybersecurity Titles That Every Job Seeker Should Know About The two biggest disciplines that can be seen represented within this list are technology and security. For all of the jobs on this list, it can be seen just … Continue reading Going on a Job Hunt