Career Paper

Inside the Career of a Cybercrime InvestigatorWe live in a time where every action involves the use of technology, or use of the internet. As we know, these technologies are continuously advancing, and Cybercrime activities have also increased significantly posing threats for everyone in our society such as individuals, organizations, communities, and governments. Those who…

CYSE 201 Article 2

In the article “Cyberbullying on Social Media,” Wright and Wachs talk about how cyberbullying is becoming a bigger problem on apps like TikTok, Instagram, and Facebook. They say one reason it is hard to deal with is because there is no clear idea of what counts as cyberbullying. Some people think it happen constantly, but…

CYSE 201 Article 1 Review

The article I decided to review is “The use of simulation in economic cybersecurity decision making.” Relating to simulation and how this topic relates to social sciences, -the study of human society and social connections. In this case, this article examines ideas of simulating procedures within organizations, in hopes these users gain knew knowledge. Some…

Understanding Hacking Humans

Reading the article was interesting I felt much like the writer initially but as I continued to analyze it further, I was able to reflect on just how much I have provided others my DNA. I thought back to a time I went for a job interview and had to complete mouth swab for a…

Ethical Considerations of CRISPR Gene Editing

Amongst the readings finding that genetic digitization or direct-to-consumer DNA is progressing swiftly. The qualifications in Bio Cybersecurity are important and should not be limited any one person that is employed in this field however, every individual should be capable yet responsible for understanding specific guidelines. Ideas of how to protect practical data is essential…

The Human Factory in Cybersecurity

Let us discuss Cybersecurity and how human factory implications can disrupt an organization. Having a security service in place would be a main part for setting up a business’s reputation, this is because protecting data amongst individuals is essential within an any organization. It is also important to dedicate efforts, time, and finances to support…

The CIA Triad

On a daily basis we’re required to provide personal details to gain access to sensitive data. These requirements are prompted when logging into bank a bank account or unlocking a phone, both options are secure practices to verify one’s identity. These steps can be repetitive at times, some may even say it’s overwhelming. However, it’s…