This vulnerability of “Improper Restriction of Operations within the Bounds of a Memory Buffer” occurs when an offender operates outside the intended buffer allowing them to read, write, or execute at the outside location. Many articles have been written about… Continue Reading →
The definition of Kinetic Cyberwarfare is when someone causes direct or indirect harm such as injury or damage to a crucial system through vulnerabilities. This concept has already happened to hospitals, power plants, and even oil companies. An example other… Continue Reading →
Many people argue that mainstream approaches to cybersecurity are insufficient in addressing the rapidly evolving world of cyber threats. Hackers with ethical/white hat hackers have valuable insights into vulnerabilities and potential attacks that could be exploited by offenders. Ethical hackers… Continue Reading →
https://www.fifthdomain.com/home/2016/10/10/what-would-a-cybercom-nsa-split-mean/ As of March of 2024, the split between U.S. Cyber Command (CYBERCOM) and the National Security Agency (NSA) was mentioned but has not been fully implemented. In 2016 when this article was written, there were discussions about separating the… Continue Reading →
Nobody is perfect. This is something everyone knows. Whether it is knowing information, bad days from illness or a live event, conflicts, and the list goes on. These factors can affect our thoughts and abilities. There is never a perfect… Continue Reading →
This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked…. Continue Reading →
In this class for Module 7, the class learned about the National Vulnerability Database which gives a score called CVSS which stands for Common Vulnerability Scoring System. This system lists the vulnerabilities found in databases in a score that reflects… Continue Reading →
This was very interesting to watch. Seeing the number of breaches that have occurred since 2013 and the businesses used daily was shocking. I find the idea of battling quantum computers with quantum science intriguing. It reminds me of the… Continue Reading →
The first law mentioned, “If there is a vulnerability, It will be exploited.” is something I agree with. Hackers find any vulnerability they can to reach their end goal. Law 2, “everything is vulnerable in some way.” is correct. Even… Continue Reading →
Answer both of the following questions: Many security companies have top-of-the-line software, yet cyberattacks still happen every day even if they are not reported. I don’t think anyone is ever 100% safe. I do think you can greatly decrease the… Continue Reading →
What I understood from this talk, is discussed how the world has become dependent on technology. In times when the internet is down, panic is involved. The internet leaves more vulnerability as banking, taxes, etc are primarily used online now…. Continue Reading →
Reference: IBM warns of rising VoIP cyber-attacks. CSO Online. (2016, December 1). https://www.csoonline.com/article/559047/ibm-warns-of-rising-voip-cyber-attacks.html
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑