A Cyber Portfolio

Author bburk002

Journal 15 – Digital Forensics

David Teo talks about his journey from being an accountant to working in digital forensics. His journey starts when he started using computers and wanted to do more with them. From Accounting to Digital Forensics It was astonishing to learn… Continue Reading →

Article 2 – Fraudster Strategies

As people look for job opportunities, malicious actors will seize the opportunity to get personal information from victims. This personal information can lead to data theft, identity fraud, and account and service hijacking. “Exploring Fraudsters Strategies to Defraud Users on… Continue Reading →

Journal 14 – Illegal Online Activities

Billions of people use the internet on a daily basis. Markets, jobs, and corporations use the internet to create sales of their products and generate revenue. However, there are some illegal activities that people and corporations do that many do… Continue Reading →

Journal 13 – Data Breach Letter

Data breaches happen to thousands of companies a day. There is no discrimination between each company as data breaches can happen to large or small organizations. In addition to data being stolen, there are some social and economic theories that… Continue Reading →

Journal 12 – Bug Bounties

Bug bounties are run by businesses to find flaws and vulnerabilities in their applications and systems. Hired professionals and regular people can participate in a bug bounty program to find bugs and earn money from the found vulnerabilities. Bug Bounties… Continue Reading →

Journal 11 – Cybersecurity Analyst

A Cybersecurity Analyst is an entry-level job. The job requires employees to monitor the network, respond to incidents, help with IT issues, and more. The Job of an Analyst A Cybersecurity Analyst is an entry-level position that requires network monitoring,… Continue Reading →

Journal 10 – National & Information Security

Information and national security need cybersecurity in order to stay safe and secure. However, there are threat actors that are willing to take any measures necessary to get their hands on confidential data. This leads to a term called information… Continue Reading →

Journal 9 – Social Media Disorder

As the world leans more and more into technology, people are starting to incorporate it into their lives. As technology starts to be used with more frequency, an addiction can occur especially with social media. Social media can have a… Continue Reading →

Journal 8 – Media Influence

People from all over the world get most of their news from media outlets. When a cybersecurity threat is on the news, people automatically think if their data has been compromised or not. However, the media has been known to… Continue Reading →

Journal 7 – CyMeme

The Human Integration System (HIS) is an interdisciplinary approach in developing and sustaining human and technology-based systems. A Human Centered Cybersecurity (HCC) is a part of the HIS which helps reduce human enabled errors. The HIS in Relation to the… Continue Reading →

« Older posts

© 2025 Brandon Burke — Powered by WordPress

Theme by Anders NorenUp ↑