Career Paper CYSE-201S

Austin Hildenbrand  CYSE 201S  Dr. Yalpi  4/17/2025  Relations with Pen-Testing and The Social Sciences  BLUF  Penetration testing in cybersecurity is not solely a technical exercise—it critically relies on insights from the social sciences to be effective. Integrating social science perspectives strengthens both the methodology and impact of penetration testing.  Introduction  In the digital world of…

Article Review 2 CYSE-201S

Austin Hildenbrand  CYSE – 201S  Dr. Yalpi  4/10/2025  Article Review #2 – AI and Cybercrime Analysis  BLUF  From a sociological standpoint, AI-driven cybercrime influences how individuals and communities interact online, trust digital systems, and adapt to evolving technological threats. As AI enables more sophisticated forms of fraud, identity theft, and misinformation, it shapes societal norms…

Article Review 1 CYSE-201S

Austin Hildenbrand  CYSE – 201S  Dr. Yalpi  2/20/2025  Article Review #1 – Intellectual Security  BLUF  A field study, composed of university youth in Jordan and Algeria, was conducted to find key factors affecting intellectual security, which is the concept and procedure aimed at protecting minds and ideas from deviation and extremism. The field study used…

Opportunities for Workplace Deviance

Austin Hildenbrand CYSE 200 11/11/2024 Bluf Workplace deviance is described as the deliberate desire to cause malicious harm to an organization, which is now encouraged and imposed by cyber technology. Many workplaces face continuous cyber threats that many are not prepared for. Phishing One of these threats is called phishing, which is a kind of…

The Human Factor In Cyber Security

Austin Hildenbrand  11/17/2024  CYSE 200  The Human Factor in Cyber Security  The human factor in cybersecurity refers to the role that individuals—employees, contractors, and even third-party vendors—play in either strengthening or undermining an organization’s security posture. In this case, it is referred to as how humans can be an asset or liability to a corporation…

SCADA Systems & Critical Infrastructure Write-Up

Austin Hildenbrand  CYSE-200  November 3, 2024  Critical Infrastructure and SCADA Systems Write – Up  BLUF  Critical Infrastructure faces new problems and is not prepared for the new vulnerabilities that are created every day. SCADA applications and systems are now used to control and maintain these infrastructures but is being questioned by officials about the security…

CIA Triad

Austin Hildenbrand09/15/24 CIA TriadThe CIA triad is the basic fundamentals of what each technological department andcompany should use. The triad consists of 3 disciplines: Confidentiality, Integrity, andAvailability. Each of these disciplines are designed to guide policies for informationsecurity within a company (Chai Article, 1).ConfidentialityConfidentiality is designed for the security of sensitive information. This can include,…