Brayden Greenfield Teresa Duvall CYSE 201S February 11, 2024 Hidden Problems Facing Iranian Women The world continues to push into a digital landscape, and new threats continue to emerge, however, old issues still prevail. These problems come from old ways of thinking and bring issues to women. In this article review, we will discuss issues…
Entry #5 Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity
Consultant YouTuber Bug Bounty Ethical Hacker Red Teamer Software Security Designer Endpoint security engineer Cybersecurity auditor User security awareness training Risk assessment consultant Incident Responser Threat Hunter Yara Rule Developer
Entry 4: Compare cybersecurity risks in the U.S. and another country.
The United States of America has a colossal cybersecurity risk. The U.S.A. is a global power, and its research is valuable to other nations. Those other nations are China, Russia, and Iraq. Why these specific countries? It is because they are at war with the U.S.A. It is not a conventional war but the first…
Entry 3: Describe four ethical issues that arise when storing electronic information about individuals
Let us start by defining an ethical issue. An ethical issue is a “branch of philosophy that deals with what is deemed right or wrong” (Swiss Cyber Institute, 2021). The four ethical issues when storing data electronically on individuals are privacy, confidentiality, implementations, and data inaccuracies (Jamshed et al., 2018).Privacy has many definitions, but today,…
Entry #2: Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
This was a tough decision because many majors can work with cybersecurity. It all depends on what aspect you focus on. I picked a broad range of majors that include Computer Science due to its close relationship with cybersecurity, but mainly for its programming, Cyber Operations (CO) because it teaches system attack, infiltration, exploitation, defense,…
Entry #1: Why are you interested in cybersecurity technology?
My cybersecurity journey had a weird start. It came from a video game called Overwatch. I originally wanted to go into game design because I loved gaming, but after making a few games, I found out it was not for me. However, I did love programming and bug fixing with game design. So, I started…
Atomic Cybersecurity: Building 1% Progress Every Day
I’ve recently embarked on a captivating journey through the pages of “Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones” by the insightful James Clear. My goal was to read a book on improving my mind, but this book has changed how I think and problem-solve. I’ve integrated his principles…
Securing Success: My Journey to the Security+ Trifecta
As I set my sights on the Security+ objectives, a profound sense of achievement looms on the horizon. Over the past month, I have relentlessly immersed myself in the world of security-related topics, each day adding another layer to my knowledge foundation. With unwavering determination, I’ve subjected myself to a battery of practice tests, meticulously…