In a TEDTalk presentation, a man by the name of Davin Teo, is a Digital Forensic Specialist, which is someone who retrieves data from a cyber incident and analyzes the data to collect clues about the perpetrator and the crime… Continue Reading →
An internet blog has described 11 illegal things you could do on the internet. While there are obviously more things you could illegally do, these are among the worst. However, I have my own top 5 ranking from least serious… Continue Reading →
In this data breach letter, a company got hacked and immediately notified the customer about this in hopes to notify the person so they can check their account before they are targeted next. Immediately, this comes off as relatable to… Continue Reading →
Cyber analysts are people who work in cyber networking and infrastructure. These are people who must understand how malware works, and how cybercriminals think in order to anticipate attacks and thwart hacking attempts. This is similar to a digital forensic… Continue Reading →
The Social Media Disorder scale is a survey taken in order to determine the kind of social media user you are. A specific score of 5 or higher may indicate that you may have a disorder based on social media… Continue Reading →
After watching the video shown, It has definitely dawned upon me once again that hackers in media are displayed MUCH differently than they are in reality. They are mostly seen as these neon green and cyan clad, futuristic geniuses that… Continue Reading →
I feel as if this meme encapsulates the notion behind what HSI really is. Simply put, Human Systems Integration is the development of computers with human limitations taken into consideration. The knowledge based on human limitation is applied to the… Continue Reading →
While there are unfortunately a large number of people who will unknowingly click on obvious malicious links from shady sources, there is a much larger number that will click the link and enter in their info if the source looks… Continue Reading →
Cybercrime is a very popular avenue of perpetration, with hacking being devastatingly effective in its usage. However everyone does not share the same motives. Below is my ranking for how much sense each motive makes, in terms of hacking(not that… Continue Reading →
Maslow has comprised a 5-tier hierarchy of human needs as one of his iconic contributions to psychology. From top to bottom, it begins with Self Actualization, where one desires to become the best version of themselves. Next is Self-Esteem, as… Continue Reading →
© 2025 CYSE 201S Portfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑