Journal 7

CYBER-BATMAN looking from A- far  while saving the world..  This relates to human-centered cybersecurity because every cybersecurity agent is basically a batman to the world Me after the command into i’ve been inputting to cyber range for 20 minutes finally worked.. In human-centered cybersecurity we get excited when our codes work after stressful tries.  Me…

Ahmed Kargbo

CYSE 201S Journal Entry #6 Phishing Hulu email. You can tell this email is a scam by how unorganized it is. The email contains random characters in places there shouldn’t be any characters. The email subject is very unprofessional. I didn’t click on the website so I’m not entirely sure the purpose of this email….

Article Review 1

9/30/24 CYSE 201S Prof. Yapli  Ahmed KARGBO Understanding the Use of Artificial Intelligence in Cybercrime Understanding the Use of Artificial Intelligence in Cybercrime (bridgew.edu) The purpose of this study by Sinyong Choi, Thomas Dearden, Katalin Parti was to describe and give insight on how cyber criminals use Artificial Intelligence to carry out cybercrimes and satisfy…

Ahmed Kargbo

Journal Entry 5 Revenge porn victims in Wales often feel ‘let down by the law’ as cybercrime slips through the net (newsfromwales.co.uk)

CYSE 201S

Ahmed Kargbo          Journal Entry #4               Maslow’s Hierarchy of Needs  Level 1: Psychological which are basic and essential needs such as; food, water, warmth, and rest which are necessary for human survival. Technology has drastically improved our basic needs with water purification systems, food production and providing superior…

NICE Workforce Framework (Journal Entry 1)

                              Ahmed Kargbo  CYSE 201S After reviewing the NICE Workforce Framework, the roles that appealed to me the most were Secure Project Management and Cybersecurity Policy and Planning. As a Secure Project Manager, I would be tasked to implement security into every project, meet goals and report project progress. I like this role because I…

Data Breaches

Ahmed Kargbo CYSE 201S Data Breaches After reading about Data Breaches on PrivacyRights.org, I learned that data breaches are inevitable, and it is best for technology professionals to always be prepped and ready with a plan. Researchers use information such as the number of breaches occurred, the type of breaches that occurred and the time…

Cybersecurity and Science

The principles of science are applied to cybersecurity from a social science standpoint or framework. Cybersecurity experts also study human behavior and use it to study and understand why individuals commit cybercrime, and why other individuals fall victim so easily. From a societal impact cybersecurity has developed a lot of relativism with the development of…

NICE Workforce Framework (Journal Entry 1)

                              Ahmed Kargbo CYSE 201S After reviewing the NICE Workforce Framework the roles that appealed to me the most were Secure Project Management and Cybersecurity Policy and Planning. As a Secure Project Manager I would be tasked to implement security into every project, meet goals and report project progress. I like this role because I…