Brayon Wesson Professor Diwakar Yalpi CYSE 201 2 October 2024 Article 1 reviewCyberbullying and Cyberbullicide Ideation Among Jordanian College Students review Research used Cyberbullying and Cyberbullicide are big factors in the everyday life of an internet user the things that are seen on the internet can be seen as malicious and very bad for people…
Author: bwess002
Career paper
Brayon Wesson 11/24/2024 CYSE 201S Professor Yalpi Cybersecurity analyst and social science To be a cybersecurity analyst it is important to understand the professional responsibility that you withhold. Cybersecurity analysts are in charge of many things that include “digital infrastructure, data, and systems from cyber threats such as hacking, malware, phishing, and data breaches”. Cybersecurity…
Article Review 2
Brayon Wesson 11/17/2024 Article review #2A review on the article “Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures” Research used In this article research is used to address we see that research shows according to the article “Artificial Intelligence (AI) has become increasingly prevalent in various industries, including cybersecurity.” AI does have…
Cyse 201S Journal entry 7
Meme 1 shows the human error of password control and how easy the data that the person is trying to access is very easy to get a hold of. Knowing this information, it is very easy to see that reminders of changing a password or making a stronger password would help in this situation. Meme…
The relationship between the principals of science and cybersecurity(Week 2 – Journal Entry 2)
The principles of science relate to cybersecurity in the way that we think about cyber advancements and systems. All seven sectors that make the principles of science is one that inherently focus on cybersecurity. With relativism we can see how almost everything changes when technology is introduced making it related to all things. Objectivity is…
Opinions on the Nice Framework
The NICE Workforce Framework outlines cybersecurity roles and skills. Personally, I find the areas of “Incident Response” and “Security Assessment and Authorization” most appealing. The dynamic nature of incident response, addressing security breaches in real-time, aligns with my problem-solving skills. Additionally, engaging in security assessments ensures proactive protection. Conversely, roles heavily centered on policy and…
Write up on The “Short Arm” of Predictive KnowledgeWrite up on
With the changing of cyber policy and infrastructure we can understand that it must change just as face if not faster than the evolving cyber field. With things like AI taking over many sub sectors of our world it makes sense to want to create things that will limit the power AI has on us….
Passage on Ethical Considerations of CRISPR Gene Editing
Reading about the bio cybersecurity I believe that ethically it seems very scary and is something that I personally cannot agree with. I say this because of the malicious intent that can be had with it, everyone has DNA creating even more risk for computers when we already have so many. It just seems like…
Passage on Opportunities for Workplace Deviance in the cybersecurity workplace
Cyber technology has a big impact on workplace deviance. You can see this with the rise of social media but also with the rise of classified information on secure software at the workplace. When we look at social media, we can see that as a more minor form of deviance in the workplace because it…
Scada paper
Scada paper Name: Brayon Wesson Date: 11/11/23 The SCADA System and its role BLUF The Scada system is one of the things that are used for critical infrastructure in a cyber context. All processed data is given to an operator and is given thoughts on why and how it affects the data is what…