Article Review #2: How AI intersects with cybercrime

Bach-Nien Doan 12/6/2024 AI’s rapid development has produced several benefits, including improved productivity and decision-making skills. It has, nevertheless, also brought up new dangers and difficulties. The most pressing of these issues is the possibility of AI being abused, particularly in cybercrime. As AI technology develops and becomes more sophisticated, fraudsters find it to be…

Article Review #1: The concept combining cyberbullying to suicide regarding Jordanian college students

Bach-Nien Doan  10/2/2024  Relationship to principles of social science   There is much evidence to prove that many sectors of businesses benefit from the internet. However, the use of technology has led to an increase in cyberbullying incidences in schools, universities and other settings outside an academic environment. Thus, social media, emails, instant messaging and other…

Intersections of cybersecurity analysts to social science 

Bach-Nien Doan  Date: 11/23/2024  Introduction  Protecting the security and integrity of data and data systems is the duty of cyber security analysts in Security Operation Centers (SOCs). Numerous techniques, including data encryption, network monitoring, and network firewall use, are used to accomplish this. These analysts are accountable for using these technologies to evaluate the legitimacy…

Week 15 – Journal Entry 15

Based on Davin Teo’s Digital Forensics’ TED talk, I would consider the speaker to be lucky to fall into digital forensics. By trade, the speaker was an accountant, and the organization needed someone in IT to help with their networks. Thus, the speaker took advantage of this opportunity based on his tinkering with computers and…

Week 12 – Journal Entry 14

Even though the internet is full of dangerous threats, most users unknowingly perform activities on the internet that are deemed illegal. Andryi Slynchuk has wrote an article describing the eleven most common activities that are performed unknowingly by users, which are illegal. Those eleven things include using unofficial streaming services, torrenting, using copyrighted images, sharing…

Week 11 – Journal Entry 13

In the field of cybersecurity, bug bounty programs have seen a sharp increase in acceptance and popularity in recent years. Once exclusive to a select group of top IT firms, this approach is now widely used by businesses of all sizes and in a variety of sectors. Businesses have realized how important it is to…

Week 10 – Journal Entry 11

Because it outperforms firewalls, cryptographic techniques, intrusion detection systems, and antivirus software, social engineering presents a serious threat to network security. Attackers are always looking for new ways to get past security measures, and their creativity keeps up with these developments. Humans are frequently the weakest link in the security chain because of our innate…

Week 11 – Journal Entry 12

This letter relates to the neutralization theory in which the hacker or hackers know it’s morally wrong to breach an organization’s servers. However, the information is of value, and it incentivizes hackers to stop at nothing to obtain the desired data. Since the platform provider for glasswasherparts.com found out about the breach in November, the…

Week 10 – Journal Entry 10

A wide range of malevolent activities carried out through contact with people are included in the category of social engineering. Psychological tactics are used to deceive users into disclosing sensitive information or committing security errors. However, critical information may be revealed due to a lack of security safeguards on social media sites and other internet…

Week 9 – Journal Entry 9

Human contact is fundamentally network-based. Humans can be thought of as nodes, and information—particularly ideas—is passed from one person to another. Social media sites like Facebook and Twitter have risen significantly to model the interactions between two users. Thus, these sites were designed from the beginning to simulate the social networks that are present in…