An Analysis of the Cactus Ransomware

Recently, the Qlik Sense Enterprise business platform has been under continuous attack by a new ransomware known as Cactus (Newsroom, 2023.) This ransomware is notorious for being the first documented incident of a threat actor exploiting a vulnerability to gain initial access to Qlik Sense Enterprise’s systems. This attack was done through the usage of…

Why Cybersecurity Analysts Need to Know Social Sciences

A cybersecurity analyst is a professional who specializes in possessing a deep understanding of an organization’s IT infrastructure in order to prevent vulnerabilities from being exploited. This can involve constant monitoring of the infrastructure, reporting vulnerabilities, and configuring tools (WGU, 2022.) The job of a cybersecurity analyst is related to the social studies because an…

Re: Victimization by Deepfake in the Metaverse

As artificial intelligence (AI) becomes more advanced, the practice of deepfaking becomes a more serious threat to security online. A proper understanding of deepfaking will inevitably bring someone to a greater understanding of the social sciences. This is because every part of the deepfake discussion and process is in some way related to the complex…

CYSE201S Journal

Module 1a Original post:• Introduce yourself in the discussion board. Include your major, your classstanding (freshman, sophomore…), anything else that you would want us toknow• Have you taken an asynchronous class before? If so, which one/s?• What are your goals after graduation, if known?• Read other students’ entries and respond to two students whose first name orlast name starts…

The CIA Triad

Among the more important concepts regarding the practice of cybersecurity is the confidentiality, integrity, and availability (CIA) triad. This triad primarily exists as a guide for information security policy within a given organization. The CIA triad is regarded by many within the cybersecurity field as a foundational concept within the practice, though it has drawn…

SCADA Systems Write-Up

The threats faced by Supervisory Control and Data Acquisition (SCADA) systems are in many ways similar to threats faced by other systems one might deal with when working in cybersecurity. The unique threats faced by SCADA systems, however, resolve around the unique nature of them. To understand this, it is vital to first understand how…

The Human Factor in Cybersecurity

The best policy in the given scenario would be to prioritize cybersecurity training, particularly as it relates to familiarizing employees outside of the IT department with cybersecurity practices. This is because the vast majority of breaches depend on a mistake on the part of someone within the target organization. There is no technology that is…

The Evolution and Expansion of IP

The most obvious difference between the internet in 2023 and 1982 is its size. In 1982, it was possible to know about everyone who had an e-mail address and list their full names and home addresses in a book Danny described as “deceptively large.” People only used what they needed in the earliest days of…

The Vital Protocols

1. One protocol that is very important in cybersecurity is the Transmission Control Protocol. 2. The transmission control protocol operates on a variety of port numbers such as Port 21, which is the control channel and Port 22, which is used for SSH (ActiveCountermeasures, 2021.) 3. The transmission control protocol allows data transfers in a…