Introduction Using schoolwork in real-world scenarios, problem-solving in difficult situations, and connecting academic achievements with long-term career goals are three key skills that stand out as particularly formative. As a soon-to-be cybersecurity graduate, I think back on my academic journey and am struck by the transformative nature of the experiences that have shaped my skills…
Kevin Mitnick research paper
Kevin Mitnick; From prisoner to a Mastermind Alexander Bascope Old Dominion University CPD 494 Professor Batchelder September 4th, 2024 The story of Kevin Mitnick’s life reads like a modern myth, one of amazing hacking achievements, government actions, imprisonment, and a remarkable return. Being both a well-known hacker and a cybersecurity consultant and educator, he is…
MFA and securing windows systems
The Effectiveness of Multi-Factor Authentication (MFA) in Securing Windows Systems Against Brute Force Attacks Alexander Bascope Old Dominion University CYSE 280 Professor Gladden November 30th, 2024 Protecting the Digital Frontier with Multi-Factor Authentication Abstract As the world grows more dependent on digital infrastructure, defending private information and online accounts has become a top priority for…
Business Plan
SecureShield Cyber Solutions Alexander Bascope 571-526-8609 Abasc002@odu.edu Table of contexts Executive Summary Business Description Organization and Management Leadership Team: State Business Goals Short-Term Goals (1-2 years): Long-Term Goals (3-5 years): Products or Services The services that SecureShield Cyber Solutions provides are the ones that follow: Unique features: Cost: Market/Industry Analysis Industry Overview: Competitors: Market Target: …
Investigating Data Breach: Trends and Insights from PrivacyRights.org
Experts can use PrivacyRights.org’s publicly available data breach information to perform in-depth research on a variety of security event topics. Researchers can learn more about the type, frequency, and extent of data breaches that occur in various businesses and sectors by examining the information supplied. They can recognize popular patterns, trends, and weaknesses that lead…
Safeguarding the Internet: The Scientific Basis of Cybersecurity Approaches
Science’s fundamental ideas are essential to cybersecurity because they offer a careful, analytical framework for comprehending and fending off online threats. Cybersecurity research involves observation, investigation, and hypothesis development, much like science. Experts in cybersecurity employ scientific techniques to examine trends, spot weaknesses, and create strong defenses. The scientific idea of lifelong learning is reflected…
Cyber Defense Analyst
I discovered this fascinating career path of becoming a Cyber Defense Analyst today. For computers, it’s like being a superhero! These people maintain a careful check on the digital world, making sure bad stuff doesn’t happen. They collaborate with other computer specialists to keep everything safe, using cutting-edge techniques to identify and neutralize cyberthreats. They…
The Human Factor in Cybersecurity
The meaning of “human factors in cybersecurity” refers to examples in which a successful data or security breach is caused by human error; these parts are the weakest part of any ICT infrastructure’s security and represent the biggest dangers and threats to a business or organization. Chief Information Security OfficerThe chief information security officer’s major…
SCADA Systems
Supervisory Control and Data Acquisition, or SCADA, is the abbreviation. A computer-based system called SCADA is used to collect and analyze real-time data for equipment that manages important and time-sensitive materials or events. In order to ensure the safe and effective operation of key infrastructure systems like power plants, water treatment facilities, and transportation systems,…
The CIA Triad
The CIA triad, also known as confidentiality, integrity, and availability, is a term invented to manage information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently referred to as the AIC triad (availability, integrity, and confidentiality). Confidentiality First is confidentiality, “Confidentiality is roughly equivalent to privacy….