aliyahmorales

Cybersecurity Student

Page 2 of 4

Article Reviews

Article 1: https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/ I would rate this article as a 5 since it is being rated on entertainment. Although, scraping 700 million LinkedIn users for fun is a lot of work. Article 2: https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms This second article is rated a… Continue Reading →

5 Illegal usage of the internet

I believe that from the list the five worst things are Collecting information from children is a very serious charge and can land someone in Jail. Using Torrent Services is dangerous for the user, most of the time torrents are… Continue Reading →

Bug Bounty Policies

Bug Bounty are programs offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. The article stated that ” many firms are skeptical… Continue Reading →

2 Social Science Theories from a Sample data breach notification

The sample data breach notification had several social science theories and economical theories. The first social science theory I gathered from the letter was victimology. The letter is notifying and encouraging customers to take action and protect themselves , which… Continue Reading →

Social Cybersecurity

 The article highlights the rising importance of social cybersecurity in national security, impacting both traditional and modern warfare. It focuses on understanding and predicting cyber-directed changes in humans to manipulate global beliefs. The article highlights the importance of information warfare,… Continue Reading →

NIST

NIST is an acronym that stands for the National Institute of Standards and Technology. NIST was originally founded by the United States Congress on March 3, 1901, as a non-regulatory federal agency within the U.S. Department of Commerce. The purpose… Continue Reading →

The Human Factor

November 12, 2023  CYSE 200T  BLUF  The articles that were assigned to read this week centered around human contribution to cyber threats either maliciously or not. As the Chief Information Security Officer that has a limited budget, a strategic and… Continue Reading →

SCADA Systems

Aliyah Morales   Old Dominion University  CYSE 200T Fall 2023  Bluf   SCADA is an acronym that stands for Supervisory Control and Data Acquisition. It is a system used to control different industrial processes remotely. Examples of infrastructure that uses SCADA are… Continue Reading →

CIA Triad

Aliyah Morales Old Dominion University CYSE 200 Cybersecurity and Social Science September 17, 2023 What is the CIA Triad? The CIA triad is a core concept and the foundation of information security and cybersecurity. The CIA stands for Confidentiality, Integrity,… Continue Reading →

Journal Article 9

On the social media disorder scale I answered yes to two out of the nine questions regarding my use of social media. I do try and limit my presence and I have a separate email account that I use for… Continue Reading →

« Older posts Newer posts »

© 2025 aliyahmorales — Powered by WordPress

Theme by Anders NorenUp ↑