As the internet and technology evolve with time, so does cybercrime. Often the weakest link in the chain of security are humans. It is important that organizations that store and manage sensitive consumer data implement safeguards and countermeasure to… Continue Reading →
Digital forensics is the collection, analysis, and reporting of various electronic data that can be preserved to be presented in a court of law. Investigators overt and covertly extract digital evidence. I find it interesting that David Teo’s path to… Continue Reading →
Andriy Slynchuk listed eleven behaviors online users engage in that may be considered illegal. These violations are often committed unknowingly or out of ignorance. However, ignorance is not enough to excuse a crime. These eleven illegal acts include faking online… Continue Reading →
According to Sridhar and Ng bug bounty policies initiatives where gig economy security researchers are paid for exposing and explaining vulnerabilities in organization code bases (p. 1). The bug bounty business is expanding rapidly, some bounties have even reach up… Continue Reading →
To share or not to share: a behavioral perspective on human participation in security information sharing by Alain Mermoud, Marcus Matthias Keupp, Ke´vin Huguenin, Maximilian Palmie´, and Dimitri Percia David centralizes on the correlation between human behavior and security information… Continue Reading →
Social Cybersecurity falls under the umbrella of national security. Social cybersecurity focuses on the science to define, comprehend, predict mediated changes in human behavior, social, cultural, political outcomes, and to establish infrastructure essential for society to continue in its essential… Continue Reading →
A cybersecurity analyst is the first line of defense. A Cybersecurity analyst at an entry level is responsible for monitoring and defending the network. The day to day may consist of responding to social engineering attacks like phishing. Social engineering… Continue Reading →
I scored a 4 out of 9 on the social media disorder scale. My areas of opportunity include dissatisfied because I wanted to spend more time on social media, failing to spend less time on social media, regularly neglecting other… Continue Reading →
© 2025 My Cyber Security Journey — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑