Cybersecurity Student

Category CYSE 201 S

Digital Forensics

A career in digital forensics investigators merges technical expertise with an understanding of social sciences. These investigators rely on their knowledge of human behavior to interpret digital evidence, to ensure a complete understanding of peoples actions. They address cybercrimes and… Continue Reading →

Article Reviews

Article 1: https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ I would rate this article as a 5 since it is being rated on entertainment. Although, scraping 700 million LinkedIn users for fun is a lot of work. Article 2: https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms This second article is rated a… Continue Reading →

Article Reviews

Article 1: https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ I would rate this article as a 5 since it is being rated on entertainment. Although, scraping 700 million LinkedIn users for fun is a lot of work. Article 2: https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms This second article is rated a… Continue Reading →

5 Illegal usage of the internet

I believe that from the list the five worst things are Collecting information from children is a very serious charge and can land someone in Jail. Using Torrent Services is dangerous for the user, most of the time torrents are… Continue Reading →

Bug Bounty Policies

Bug Bounty are programs offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. The article stated that ” many firms are skeptical… Continue Reading →

2 Social Science Theories from a Sample data breach notification

The sample data breach notification had several social science theories and economical theories. The first social science theory I gathered from the letter was victimology. The letter is notifying and encouraging customers to take action and protect themselves , which… Continue Reading →

Social Cybersecurity

 The article highlights the rising importance of social cybersecurity in national security, impacting both traditional and modern warfare. It focuses on understanding and predicting cyber-directed changes in humans to manipulate global beliefs. The article highlights the importance of information warfare,… Continue Reading →

Journal Article 9

On the social media disorder scale I answered yes to two out of the nine questions regarding my use of social media. I do try and limit my presence and I have a separate email account that I use for… Continue Reading →

How the media portrays hackers

The media’s portrayal of hackers often falls into the trap of romanticization, oversimplifying and glamorizing their activities without understanding the hacking process. Rather than capturing the diverse reality of hackers, the media tends to stereotype and that does not align… Continue Reading →

Cybersecurity Insights through Memes

Meme Concept: A person expressing relief after successfully connecting to a free Wi-Fi in an unusual setting and can complete a security update: “That moment when you find free Wi-Fi and update your security!” That moment when your system is… Continue Reading →

« Older posts

© 2025 aliyahmorales — Powered by WordPress

Theme by Anders NorenUp ↑