Gavin Ridges Professor Armistead CYSE201S 12/3/2022 Ethical hacking can be a great way for a company to make progress on their security system within their domain without the risk of an outside source breaching through. Ethical hackers look for vulnerabilities that they can report back to an organization. If it were not for ethical…
Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Sharing addresses, passwords and photos can be something that may danger an entire household. By giving away an address to someone this can instantly give everyone on the internet the power to send unwanted things to this address, go to this house and stalk those that go in and out, and most importantly give out…
The Artificial Intelligences Possibilities in Cybersecurity
Gavin Ridges Dr. Leigh Armistead CYSE201S-23181 5 November 2022 Article Review 2: Artificial Intelligences (AI) Possibilities in Cybersecurity For article review two, I have chosen an article from International Journal of Cybersecurity Intelligence & Cybercrime, and Journal of Cybersecurity. In this article it goes over how the inclusion of AI in cybersecurity infrastructures and why…
Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
As a Cybersecurity Analysist, someone will be seeing a different look everyday depending on the company. In different locations you can be looking at a better or worse situation when it comes to salary. The job varies in the different cultures that it is exposed to. Many analysist will be on the road to different…
Read this and write a journal entry summarizing your response to the article on social cybersecurity.
When it comes to cyber security and the military many would think that they would be developed. Though this goes to show that the different branches within the military are more advanced than others. As the military has developed we have seen just how important it is that the military adjusts to information security and…
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
The score I got was a moderate indication to internet addiction. To me this feels like the norm for many people in this world that has access to the internet. There’s is so many things that goes into it and one being school work. Much of the work done is over the internet and already…
Watch this video and pay attention to the way that movies distort hackers. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
The media can either deter us to think the wrong things or can be very useful and informational. That’s just how 50/50 it can be though. With movies we can see that many parts of it are overexaggerated. The realness is taken away from them because they have to compensate for the entertainment for their…
Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.
When relating this to Human Systems Integration (HSI), we can see how this individual is trained in cyber safety and how he is protecting him and his family’s safety. It has been the main topic around cyber security how humans are the primary problem to a never-ending situation. Humans are not making the right decisions…
Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
From most to least sense, I would go with multiple reasons, revenge, money, political, entertainment, recognition, and boredom. I went with multiple reasons as my number one because it only makes sense that you have more than one thing hounding on you until eventually you’re broken down and do things that are not legal. Especially…
Article Review 1
The article that I have chosen is from the International Journal of Cybersecurity Intelligence and Cybercrime. The article is named, “The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence”. In summary, this article goes over why human behavior can impact us as humans from further developing our skills or…