Author Review – 5 Most Serious Violations
There are many crossovers from the real world to the cyberspace that remain illegal. This article covers such instances, some of which may be considered less impactful than others. For Continue Reading →
Andrew Friend
There are many crossovers from the real world to the cyberspace that remain illegal. This article covers such instances, some of which may be considered less impactful than others. For Continue Reading →
Andrew Friend 05 April 2024 SOC Analysts and The Social Sciences The principles of science are social sciences spanning 7 unique principles. These are Relativism, Objectivism, Determinism, Parsimony, Ethical Neutrality, Continue Reading →
The authors of this article, supported by HackerOne, a platform for bug bounty programs, provide empirical evidence supporting the assertion that these programs are a cost-effective means for companies to Continue Reading →
The source document comes from a company hosted at www.glasswasherparts.com. The platform provider of this site experienced a data breach affecting the span of February to December 2016. As a Continue Reading →
Starting in any field, it is important to utilize the existing networking skills you may have. These networking skills and social behaviors are perishable, meaning to be proficient, you need Continue Reading →
After reading the article Social Cybersecurity; An Emerging National Security Requirement, authored by Lt. Col. David M. Beskow, U.S. Army, and Kathleen M. Carley, Ph.D., I was struck by this Continue Reading →
Hypothesis While acknowledging the safety debate proponents of Client Side Scanning (CSS) pose, the authors of this paper argue against the implementation of CSS by highlighting how It may fail. Continue Reading →
I scored a 2 out of 9 on the scale. I think one aspect missing from this scale is boredom. How many of us head to social media just because Continue Reading →
Media has a powerful effect on how society interacts with and understands Cybersecurity. These varying ways in which movies and articles talk about aspects of hacking, for example, may misconstrue Continue Reading →
Hypothesis This research paper, from the Journal of Cybersecurity, first sets the stage for its research hypothesis by discussing the current landscape of cyber conflict. The hypothesis states that adversaries Continue Reading →