Cyber warfare has become a powerful tool in recent conflicts, targeting both military and civilian infrastructure. During the 2023 Israel-Hamas conflict, cyberattacks were launched against Israel’s critical systems which included their power grids, emergency alert systems, and communication networks. These cyber operations show how attacks on essential services can not only delay emergency responses but…
Author: hmaca002
Virtue Ethics and the Ethical Dilemmas in Software Development
In his article, “The Code I’m Still Ashamed Of,” Bill Sourour reflects on an experience from his early career that has haunted him ever since. In 2000, he was tasked with coding a quiz for a pharmaceutical website targeting teenage girls. Although the site presented itself as a general health resource, the quiz was rigged…
Individual Reflection
Reflecting on my internship journey, there were several factors that contributed to its success. Firstly, the unwavering support and guidance from Professor Duvall and industry expert Greg Tomchick played a pivotal role. Professor Duvall’s nurturing approach made us feel valued and motivated, while Greg Tomchick’s insights into cybersecurity and risk assessment were invaluable. Their mentorship…
Reflection 3
During the third set of 50 hours of my cybersecurity internship, the emphasis onteamwork became clear as we engaged in a comprehensive risk assessment for Origami Software Solutions for Beth Vincent. Our team, comprising individuals with diverse skills and expertise, collaborated well with this project. Lee emerged as our leader, organizing our efforts, and ensuring…
Reflection 2
During the second 50 hours of my CYSE 368 internship, I delved deeper into the worldof cybersecurity. This time around, we focused on how to sell cybersecurity and communicateeffectively with business owners who aren’t well-versed in cybersecurity. It was a nerve-wracking experience at first, especially approaching businesses and getting used to hearing “no.” But gradually,…
Reflection 1
Entering college, I found myself navigating through different fields, unsure of where mypassion lay. Nursing seemed promising initially, but my time as a CNA revealed my aversion toblood. (I passed out after watching the nurse prick the patient’s finger for their blood sugar.)Transitioning to computer science, I soon realized that coding around the clock wasn’t…
Midterm
The National Cybersecurity Strategy March 2023: Protecting Our Digital Backbone In the face of escalating cyber threats to its online infrastructure, the United States finds itself navigating a complex digital landscape full of risks and vulnerabilities. The advent of the National Cybersecurity Strategy March 2023 marks a pivotal point in the nation’s cybersecurity posture, serving…
Module 15
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. The career of digital forensics relates to the social sciences because it involves understanding human behavior, legal and ethical considerations, and social…
The Role of Social Science in Penetration Testing
In the rapidly evolving landscape of cybersecurity, penetration testing has emerged as a critical career ensuring the resilience of digital systems against potential threats. This paper explores the integral connection between social science research and principles and the daily routines of penetration testers. By examining key concepts learned in class, this paper will delve into…
Opportunities for Workplace Deviance
In today’s workplaces, cyber technology has brought about some challenges: workplace deviance. First off, with remote work becoming more common, many people do not do their jobs while they are clocked in. This decreases productivity and it is difficult to hold remote workers accountable. Secondly, there are people who try to harm the company by…