Cyberattacks do not get the publicization they truly deserve and the public truly does notunderstand the severity of them until it happen to them and it’s too late. This article made greatpoints regarding cyberattacks, threats, and necessary support regarding cyber… Continue Reading →
Cybersecurity is very complex and is a major topic in corporations to ensure they have efficient teams and stakeholders who are familiar with the field making quick critical decisions on behalf of the company. The article “Executive Decision-makers: A Scenario-based… Continue Reading →
Most cyber-attacks have some type of motive that drives them to pursue the attack, so ranking the motives from what makes the most sense to which makes the least. Starting at #1 I would choose political motives. This motive makes… Continue Reading →
Fake websites also known as phishing have been seen a lot more frequently in emails but there are many ways to spot if it is real or not. Walmart have been a corporation that has been victim to phishers making… Continue Reading →
. “Cybersecurity careers and social science” By Dominique Taylor. Cybersecurity is a growing field that relies on many things to provide information so that it can grow and do its job effectively. One main assistant is social science due to… Continue Reading →
Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career…. Continue Reading →
. Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The article “11 Illegal Things… Continue Reading →
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Links to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. This sample breach letter doesn’t provide much information… Continue Reading →
watch this video https://www.youtube.com/watch?v=iYtmuHbhmS0 think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. A cyber analyst is a very interesting job and is the… Continue Reading →
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. This article was very interesting in regard to seeing how the evolution of warfare has changed so drastically due… Continue Reading →
© 2025 Portfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑