Career Paper

CYSE 201s Prof. Yapli Ahmed Kargbo Why choose a career in Cybersecurity? With cybercrime on the rise, cybersecurity is the fastest growing field ranking #4 on Career One Stop. According to cyber expert George Mutune “Cybercrime is projected to cost the world trillions of dollars in the coming years” (Mutune 1). Mutune also goes on…

Journal 15

CYSE 201s Ahmed Kargbo After watching Devin Teo discuss his career as a digital forensic investigator, it is very interesting to hear about how he got into the field. Teo’s pathway to becoming a digital forensics investigator is very relative to the time in which he was getting his education. In the earlier years of…

Journal 14

CYSE 201S  Ahmed KargboAfter reading “11 Illegal Things You Unknowingly Do on the Internet” by Andriy Slynchuk, I have noted that the five most serious violations and offenses are: using illegal streaming services, faking your identity online, bullying, using copyrighted images, and using torrent services. Using illegal streaming services is a violation that definitely stuck…

Journal 13: Hacking For Good 

CYSE 201s Ahmed Kargbo This article simply focuses on how individuals can use their hacking skill for positive purposes. Using hacking methods positively can be used to identify and fix vulnerabilities and also protect organizations and individuals from malicious attacks.  From the cost/benefit policy standpoint, the article breaks down the cost of dealing with a…

Jornal 12 Sample Data Breach

CYSE 201s Ahmed Kargbo After reading the sample data breach notification I have found multiple economic theories and social science theories.  Information Asymmetry Theory: This is a principle that focuses on instances when one party has more information than the other. In the case of this data breach the platform is holding and storing all…

Article Review #2

11/11/2024 CYSE 201s Prof. Yapli  Ahmed Kargbo Privacy Threats in Intimate Relationships Privacy threats in intimate relationships | Journal of Cybersecurity | Oxford Academic The article Privacy Threats in Intimate Relationships by Karen Levy and Bruce Schneier investigates how privacy is usually easily compromised within the conditions of close knit and personal relationships. This article…

Ahmed Kargbo

CYSE 201s Cybersecurity Analyst Journal 11 A cybersecurity analyst typically monitors an organization’s network, responds to various incidents such as: phishing, spam, vulnerabilities etc. Cybersecurity analysts usually serve as the first line of technological defense for an organization. Working and collaborating with other humans is a critical part of cybersecurity. Analysts are also responsible for…

Ahmed Kargbo

CYSE 201s Social Cybersecurity Journal 10  Social cybersecurity is an upcoming category of cybersecurity associated with the study of social factors and human behaviors and how these two categories will function in the cyberspace. National Security is the main concern between the two factors (human behavior & social influence). Social cybersecurity poses a threat for…

Ahmed Kargbo

CYSE 201s  Social Media Scale Journal 9  On the Social Media Disorder Scale, I scored a 3 out of 9. I was only guilty of three out of the nine actions listed in the text. I think the items listed display how seriously you incorporate social media into your lifestyle. I think there are different…

Ahmed Kargbo

CYSE 201S                 How the Media Influences our Understanding about CybersecurityThe 25-minute video from The Insider featuring Hacker Keren Elazari gives real perspective and context to our hacking beliefs. I like how Elazari analyzes each scene and explains each hack and then confirms if said hack is real or not. When you factor in media, cybersecurity,…