For me personally, I believe the biggest cybersecurity challenge in 2040 will be ensuring that data continuously collected by our smartphones, social media, and the internet in general is kept anonymized and safe. With more and more companies jumping on the data collection/aggregation bandwagon, it seems inevitable that the collection and selling of user…
CYSE/IT 200T Midterm Video: Why the Government Shouldn’t Regulate IoT Devices
Video Link (The file was too large to upload here) Finishing this product proved to be more difficult than expected, but overall I feel it was successful. In order to complete the video as a group, we took the following steps. Establish lines of communication through email. Brainstorm potential arguments based on sources we find….
CYSE/IT 200T Weekly Freewrite 11
Considering the various factors surrounding Russian intervention in the 2016 election, I would say that the ad in question is indeed Cyberwar by definition. The Kremlin and other Russian entities purchased hundreds of ads across sites like Facebook and Twitter, taking advantage of algorithms that target certain users to disseminate their misinformation to those…
CYSE/IT 200T Weekly Freewrite 10
Marshall County Man Convicted of Federal Cyberstalking and Gun Crime: https://www.justice.gov/usao-ndms/pr/marshall-county-man-convicted-federal-cyberstalking-and-gun-crime Gender: Male Age: 54 Country of Origin: U.S. Florida Man Sentenced to Prison for Extensive Cyberstalking and Threats Campaign: https://www.justice.gov/opa/pr/florida-man-sentenced-prison-extensive-cyberstalking-and-threats-campaign Gender: Male Age: 31 Country of Origin: U.S. Lincoln Man Sentenced for Cyberstalking: https://www.justice.gov/usao-ne/pr/lincoln-man-sentenced-cyberstalking Gender: Male Age: 20 Country of Origin: U.S. Portland Man…
CYSE/IT 200T Weekly Freewrite 9
VPNs are some of my favorite tools for maintaining privacy online. They offer a multitude of benefits to users even aside from keeping your browsing habits private. The first major one of course, is anonymity. This means that while your VPN is activated, no one, not even your internet provider can view which sites…
CYSE/IT 200T Weekly Freewrite 8
I do believe that in today’s age many people do treasure physical property more than personal data online. This is likely because of 1) personal property is tangible and 2) more money is required to accrue it. In thinking this way, they often forget or take for granted online privacy and deem it unimportant….
CYSE/IT 200T Weekly Freewrite 7
Reward Mechanisms Monthly Bonuses I think this reward would be especially effective simply due to human nature. Everyone wants to make more at the job they have, so employees that are noted to have exemplary cybersecurity conduct will be given a bonus at the end of each month, to encourage friendly competition in regard to…
CYSE/IT 200T Weekly Freewrite 6
Coding a program that automatically checks for known bugs and flaws in widely used systems. Yacht GPS software that is secure. Building proper cybersecurity infrastructure for small businesses. Engineering a program that simulates real attacks on systems for the purpose of teaching. Revising the current CS policies of various businesses to keep them updated. Software…
CYSE/IT 200T Weekly Freewrite 5
How do you create and store your personal passwords? This question is important as although most companies have guidelines on how to create and store passwords for company use, personal accounts can still create vulnerabilities in a company’s infrastructure. The desired answer would be that they use either randomly generated-numbers or random phrases they’ve put…
CYSE/IT 200T Weekly Freewrite 4
In my imaginary cyberattack, the attacker would target the server responsible for pushing updates to the firmware of various computer devices on a large corporate office’s network. This office would be the headquarters of a national bank. To carry out the attack, the hacker could intercept the server’s traffic as it downloads updates, enabling…