Austin Hildenbrand CYSE 201S Dr. Yalpi 4/17/2025 Relations with Pen-Testing and The Social Sciences BLUF Penetration testing in cybersecurity is not solely a technical exercise—it critically relies on insights from the social sciences to be effective. Integrating social science perspectives strengthens both the methodology and impact of penetration testing. Introduction In the digital world of…
Article Review 2 CYSE-201S
Austin Hildenbrand CYSE – 201S Dr. Yalpi 4/10/2025 Article Review #2 – AI and Cybercrime Analysis BLUF From a sociological standpoint, AI-driven cybercrime influences how individuals and communities interact online, trust digital systems, and adapt to evolving technological threats. As AI enables more sophisticated forms of fraud, identity theft, and misinformation, it shapes societal norms…
Article Review 1 CYSE-201S
Austin Hildenbrand CYSE – 201S Dr. Yalpi 2/20/2025 Article Review #1 – Intellectual Security BLUF A field study, composed of university youth in Jordan and Algeria, was conducted to find key factors affecting intellectual security, which is the concept and procedure aimed at protecting minds and ideas from deviation and extremism. The field study used…
Opportunities for Workplace Deviance
Austin Hildenbrand CYSE 200 11/11/2024 Bluf Workplace deviance is described as the deliberate desire to cause malicious harm to an organization, which is now encouraged and imposed by cyber technology. Many workplaces face continuous cyber threats that many are not prepared for. Phishing One of these threats is called phishing, which is a kind of…
The Human Factor In Cyber Security
Austin Hildenbrand 11/17/2024 CYSE 200 The Human Factor in Cyber Security The human factor in cybersecurity refers to the role that individuals—employees, contractors, and even third-party vendors—play in either strengthening or undermining an organization’s security posture. In this case, it is referred to as how humans can be an asset or liability to a corporation…
SCADA Systems & Critical Infrastructure Write-Up
Austin Hildenbrand CYSE-200 November 3, 2024 Critical Infrastructure and SCADA Systems Write – Up BLUF Critical Infrastructure faces new problems and is not prepared for the new vulnerabilities that are created every day. SCADA applications and systems are now used to control and maintain these infrastructures but is being questioned by officials about the security…
CIA Triad
Austin Hildenbrand09/15/24 CIA TriadThe CIA triad is the basic fundamentals of what each technological department andcompany should use. The triad consists of 3 disciplines: Confidentiality, Integrity, andAvailability. Each of these disciplines are designed to guide policies for informationsecurity within a company (Chai Article, 1).ConfidentialityConfidentiality is designed for the security of sensitive information. This can include,…