After reviewing articles related to cybercrime motives, I ranked the motives from most plausible to least, prioritizing the most tangible and immediate motivators.
As a senior cybersecurity student and member of the Cyber LeADERS program at Old Dominion University, I'm excited to reflect on how technology relates to my experience with Maslow's Hierarchy of Needs: physiological, safety, love and belonging, esteem, and self-actualization. Technology is crucial at every level of my needs, from meeting basic physiological needs to enabling self-actualization. I use technology to fulfill my physiological needs, such as getting food. Dr. Brian Payne's speech... Read More
As I visit PrivacyRights.org, I go to the Data Breach Chronology page, which provides a wealth of publicly available information on reported data breaches in the United States. This treasure trove of data includes details such as the names and types of businesses involved, the kind of breach or personal information exposed, the number of records affected,... Read More
Explaining the principles of science as they relate to cybersecurity through a social science framework involves understanding how various scientific principles inform and shape the field. Relativism emphasizes the interrelated nature of things, suggesting that changes in any system can impact cybersecurity. Objectivity means studying topics in a value-free way. When studying cybersecurity from a social science perspective, researchers must be objective. The principle of... Read More
Today, after reflecting on the Workforce Framework for Cybersecurity (NICE Framework), I've realized that my career interests strongly align with the “Design and Development” and “Oversight and Governance” categories. I find design and development particularly exciting as experience in this category can allow me to innovate and create new technological solutions to address cybersecurity challenges, which is central to my goal of pioneering groundbreaking technologies.... Read More