I believe this question may provide interesting responses. If we ‘blame the victim,’ we are essentially suggesting that simply entering a bank makes us responsible for being involved in a bank robbery, or that posting on social media means we… Continue Reading →
If the survey were based on previous crimes I was convicted of, I would answer honestly even though my record is clean. However, if it covered my entire life experience, I would not participate. Although I have nothing to hide,… Continue Reading →
References: Repko, A. F. & Szostak, R. (2021). Interdisciplinary research: Process and theory (4th ed.). SAGE Publications, Inc.
The speaker discussed how the career of digital forensics ‘fell into his lap’ per se. Davin Teo started as an accountant and moved into the IT world due to an opening. He then proceeded to do both careers eventually completing… Continue Reading →
In the next ten years, the biggest cybersecurity worry will be more advanced cyberattacks using new technologies like AI, quantum computing, and IoT. These new technologies can help protect against attacks but also make it easier for cyber criminals to… Continue Reading →
This vulnerability of “Improper Restriction of Operations within the Bounds of a Memory Buffer” occurs when an offender operates outside the intended buffer allowing them to read, write, or execute at the outside location. Many articles have been written about… Continue Reading →
The routine theory believes that crime occurs when 3 activities happen at the same time. The 3 activities are motivated offenders, suitable targets, and the absence of capable guardians. This video explains that one family fell victim to an online… Continue Reading →
The definition of Kinetic Cyberwarfare is when someone causes direct or indirect harm such as injury or damage to a crucial system through vulnerabilities. This concept has already happened to hospitals, power plants, and even oil companies. An example other… Continue Reading →
I believe some may not report is that they do not know how to go about reporting. Before exploring the world of cybersecurity I used to think “Well what would the police even do?” and I believe others will think… Continue Reading →
Many people argue that mainstream approaches to cybersecurity are insufficient in addressing the rapidly evolving world of cyber threats. Hackers with ethical/white hat hackers have valuable insights into vulnerabilities and potential attacks that could be exploited by offenders. Ethical hackers… Continue Reading →
https://www.fifthdomain.com/home/2016/10/10/what-would-a-cybercom-nsa-split-mean/ As of March of 2024, the split between U.S. Cyber Command (CYBERCOM) and the National Security Agency (NSA) was mentioned but has not been fully implemented. In 2016 when this article was written, there were discussions about separating the… Continue Reading →
The best way to view cybersecurity from an economic point of view is through a cost-benefit analysis. This analysis can help businesses or organizations determine the best way to reduce the risk of cyber incidents and spending costs. Budgets can… Continue Reading →
The best way to view cybersecurity from an economic point of view is through a cost-benefit analysis. This analysis can help businesses or organizations determine the best way to reduce the risk of cyber incidents and spending costs. Budgets can… Continue Reading →
My top 5 list of most serious crimes online from the provided chart: 1. This may seem like an obvious choice, and it should be. Collecting this data without parental consent is very illegal and violates the Children’s Online Protection… Continue Reading →
Nobody is perfect. This is something everyone knows. Whether it is knowing information, bad days from illness or a live event, conflicts, and the list goes on. These factors can affect our thoughts and abilities. There is never a perfect… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑