Ranking Individual Motives 1-7
Category: BLOG
Week 4 – Journal Entry
Maslow’s Pyramid of Needs Maslow’s Pyramid of Needs relates significantly with my experiences with technology. Basic needs, safety, sense of belonging and self-actualization can all be achieved and enhanced through technology. Technology provides tools and mechanisms that help improve our mental health and privacy needs. Smartphones include features that make like very inconvenient like GPS…
Week 12 – Journal Entry 13
Understanding Bug Bounty Programs The article “Hacking for Good” uses HackerOne data to investigate bug bounty schemes, in which users are compensated to discover security flaws in enterprise software. This study demonstrates that these initiatives are an effective approach for businesses to strengthen their security without investing a lot of money. It discovers that people…
understanding the implications of a data breach through the lens of both economic and social sciences
Understanding the impact of a data breach through economic and social sciences theories is crucial to get a broader view the impact. Keynesian theory suggests that data breaches can lower consumer confidence, particularly in online shopping, leading to reduced spending and a decline in online transactions. As aggregate demand falls it leads to a lower…
Article#2 Review
Title: Enhanced Cybersecurity Through Social Science: A Critical Review of Lanz’s Analysis on Critical Infrastructure Name: Zufan Abebe Date: 03/24/2024 IntroductionZachary Lanz (2022)’s “Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of Publicly Available U.S. Government Alerts and Advisories” is examined for its social science principles, research methodology, data analysis, and implications for marginalized groups…
Ranking the cybercrime motives:
2. For Money: Cybercriminals are motivated by financial benefits, which gives their acts a reasonable side.
Week 3 – Journal Entry
PrivacyRights.org PrivacyRights.org is an excellent resource for researchers investigating data breaches. It describes which companies were affected, what data was compromised, and how many people were affected. For inexperienced cybersecurity students like us, it’s like delving into real cyber challenges. We can understand how hackers operate, identify trends, and determine where businesses require additional protection….
Week 2 – Journal Entry
How the principles of science relate to cybersecurity In the changing world of cybersecurity, scientific concepts serve as a covert weapon against emerging online threats. This investigation digs into the relationship between the scientific process and securing digital environments, building on my experience as a junior cybersecurity consultant, with a specific emphasis on medical equipment….