Using real cases of past data breaches allows researchers to get a better understanding of the nature of data breaches and how they happen. Using real data of cases allows researchers to get understand what factors allow someone to be… Continue Reading →
As technology becomes more and more a part of our lives, I think that it will start to take place in Maslow’s Hierarchy of Needs. I think that in some ways it already has a place on the pyramid. A… Continue Reading →
There are eight scientific principles, and these principles are also applied to cyber security as a social science. The eight principals are relativism, objectivity, parsimony, empiricism, skepticism, ethical neutrality, and determinism. These eight principals can be applied to cyber security… Continue Reading →
I am new to the field of cybersecurity and don’t know a lot about it other than a broad understanding of what cybersecurity is along with a basic idea of the use of coding through Python. I am really interested… Continue Reading →
This is a post. Use posts to update your blog.
© 2025 Christopher Angulo Cyber EPortfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑