Week 4 – Journal Entry

Maslow’s Pyramid of Needs Maslow’s Pyramid of Needs relates significantly with my experiences with technology. Basic needs, safety, sense of belonging and self-actualization can all be achieved and enhanced through technology. Technology provides tools and mechanisms that help improve our mental health and privacy needs. Smartphones include features that make like very inconvenient like GPS…

Week 12 – Journal Entry 13

Understanding Bug Bounty Programs The article “Hacking for Good” uses HackerOne data to investigate bug bounty schemes, in which users are compensated to discover security flaws in enterprise software. This study demonstrates that these initiatives are an effective approach for businesses to strengthen their security without investing a lot of money. It discovers that people…

Article#2 Review

Title: Enhanced Cybersecurity Through Social Science: A Critical Review of Lanz’s Analysis on Critical Infrastructure Name: Zufan Abebe Date: 03/24/2024 IntroductionZachary Lanz (2022)’s “Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of Publicly Available U.S. Government Alerts and Advisories” is examined for its social science principles, research methodology, data analysis, and implications for marginalized groups…

Week 3 – Journal Entry

PrivacyRights.org PrivacyRights.org is an excellent resource for researchers investigating data breaches. It describes which companies were affected, what data was compromised, and how many people were affected. For inexperienced cybersecurity students like us, it’s like delving into real cyber challenges. We can understand how hackers operate, identify trends, and determine where businesses require additional protection….

Week 2 – Journal Entry

How the principles of science relate to cybersecurity In the changing world of cybersecurity, scientific concepts serve as a covert weapon against emerging online threats. This investigation digs into the relationship between the scientific process and securing digital environments, building on my experience as a junior cybersecurity consultant, with a specific emphasis on medical equipment….