Career Paper

Brittney DavisCYSE 201SProfessor Trinity WoodburyApril 26, 2025 Career Paper Penetration Tester A Penetration Tester, or “ethical hackers,” as they are more commonly known, is an ITprofessional who a company or organization hires to assess the security of its computer systemsand networks by simulating cyberattacks. In cybersecurity, penetration testers are pivotal becausethey can find vulnerabilities in…

Journal Entry # 10

Read this and write a journal entry summarizing your response to thearticle on social cybersecurity The article “Social Cybersecurity: An Emerging National Security Requirement” explores the significance of social cybersecurity and its effects on national security. It also defines social cybersecurity as a multidisciplinary field that studies how cyber-mediated interactions can influence human behavior, social…

The Human Factor In Cybersecurity

The Human Factor in Cybersecurity During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats. Now, put on your Chief Information Security Officer hat. Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?…

The CIA Triad

CIA Triad and Authentication vs Authorization The CIA Triad, or AIC Triad, is a cybersecurity blueprint consisting of three key concepts. These are the key principles used to ensure the security and reliability of information systems. The CIA Triad is crucial in securing data, but authentication and authorization verify a user’s identity and determine the…

SCADA System

SCADA SYSTEMS Supervisory Control and Data Acquisition, or SCADA for short, refers to Industrial Control systems (ICS) that control infrastructure, facility-based, and industrial processes (Google Doc, SCADA Systems, 2020). Critical infrastructure is our country’s vital system; Scada comes into place because it monitors and controls processes within these infrastructures. While these processes and systems are…

Journal Entry # 9 Social Media Disorder Scale

Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pintrist, forums, weblogs) in past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine) criteria must be met for a…

Journal Entry # 6

How can you spot fake websites? Compare three fake websites (don’t access those sites, of course) to three real websites. What makes the counterfeit websites fake? Examples of Possible Fake websites: • TiffanyCoShop.com• Sheingivesback.com• Zorasoul.co Examples of Legitimate websites:• www.tiffany.com• www.shein.com• www.temu.com Some ways to detect a fake website:• Carefully check the URL for misspellings•…

Journal Entry #5

Motives Ranking Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 1. Political—Political motives make the most sense when it comes to cybercrimes because most people are passionate…