CYSE 201S

  • Journal Entry 15 – Evil AI!?

    My main concerns from the video provided are about consenual data usage and law-related precedent. Firstly, how are non-consensual uses of data relating to AI going to be treated in law? OpenAI tested the waters pretty recently with the release of their newest version of Sora, which is a video-generating AI tool. It had seemed……

    Click to Read More…

  • Journal Entry 14 Ranking Crime!

    I think the most serious of these internet offences are collecting info about a child, sharing passwords\log in info/photos without consent, bullying, using other people’s internet and recording VoIP without consent in that order (1st is worst). I think that all of these are at least somewhat bad, but some of these matters are more……

    Click to Read More…

  • Journal Entry 13 – Bug Bounty

    This is a very unique way of finding bugs in systems, offering a bounty offers non-malicious incentive to hack systems and in return both sides win from this scenario. The paper finds that smaller bounty rewards still lead to similar numbers of bug reports meaning that smaller budgeted cybersecurity teams can make great results while……

    Click to Read More…

  • Journal Entry 12 – Economic Theory

    The first theory that this is related to is classical economics. It’s related to the company’s lack of government involvement. They leave the reaching out to government help on the affected parties rather than themselves. The next is rational choice which is related because it is in the company’s best rational interest to notify affected……

    Click to Read More…

  • Journal Entry 11 – Cyber Securtiy Culture

    The main social themes that show up in this video are cultures of different cities and networking. The culture of cities is important to take into account when choosing which job opportunities to pursue. The author of this video makes it a serious point to consider the circumstances of the location. She describes the social……

    Click to Read More…

  • Journal Entry 10 – Mini-Article Review

    Mulahuwaish et al. discuss what social cybersecurity is, examples of cybercrime and potential solutions. They consider past studies that cover every category possible and what roles those studies play. This article is very informative, and that is evident in the many tables that explain problems, solutions, previous studies and detection methods referenced from those studies….…

    Click to Read More…

  • Journal Entry 9 – Social Media Disorder

    On the disorder quiz, I scored a 3, which is considered “risky usage”. This was a bit surprising to me. I do use social media like YouTube and Instagram more than I probably should. I love watching long videos that discuss obscure topics or video essays about movies, shows or games. YouTube is amazing for……

    Click to Read More…

  • Journal Entry 8 – Reviewing Hacking in Media

    From what this video shows, there is a decent bit of accuracy when it comes to hacking and cybersecurity in media. Of course, there are cases of the “Bypassing the mainframe…” and “Computer enhance…” moments in media, but the movies/shows that were showcased in the video all appeared to be somewhat accurate. The most egregious……

    Click to Read More…

  • Journal Entry 6 – Spoof Sites

    In the first example I used I found that a fake website can have an unfamiliar UI while using the name of a different widely used company to bait in users with a familiar name. The second example I used I found that “spoof” sites will have a very similar UI to other popular or……

    Click to Read More…

  • Journal Entry 5 – Cybercrime Motivation Tierlist

    The motives behind cybercrime can range from being super simple to a myriad of emotions and reasons. I am going to rank the most common motives from 1 to 8 (1 making the most sense and 8 making the least).  1. MoneyMoney makes the most sense because it is the leading cause of most crime……

    Click to Read More…

  • Article Reviews

    This is a collection of article reviews done for my CYSE 201S class!

    Click to Read More…

  • Journal 4 – Maslow’s Hierarchy of Needs and The Current Online Environment

    The online experience and Maslow’s hierarchy of needs have a resounding correlation. The bottom tier, being physiological needs, is fulfilled by access to the internet via a device and a stable connection. Online security fulfills the safety tier. Things like having a secure account and practicing safe behaviors keep unwanted attackers from accessing personal accounts……

    Click to Read More…

  • Journal Post 3 – Research on Security Breaches

    Using the data provided by the “Q1 Data Breach Report,” I can see that the companies/organizations that are targeted the most are healthcare and business-related. This shows that these fields are not only important, but hold lots of data that could be valuable to cyber criminals. Researchers can use this information to predict which companies/organizations……

    Click to Read More…

  • Journal Post 2 – Empiricism

    Empiricism is an essential principle in any science, and in cybersecurity, it plays a critical role in enhancing protection. By analyzing patterns in user behavior and system data, security teams can identify potential threats and prevent cybercrime before it occurs. This proactive approach allows for the early identification of suspicious activity, which is crucial for……

    Click to Read More…

  • Journal Post 1 – NICE Framework interests

    Oversight and investigation are the areas I am most interested in. Investigation seems very engaging as a career because of the problem solving and analysis elements. Oversight seems interesting due to the amount of roles I could play. A career in that area is probably constantly changing because of the sheer amount of responsibilities that……

    Click to Read More…