The speaker discussed how the career of digital forensics ‘fell into his lap’ per se. Davin Teo started as an accountant and moved into the IT world due to an opening. He then proceeded to do both careers eventually completing… Continue Reading →
My top 5 list of most serious crimes online from the provided chart: 1. This may seem like an obvious choice, and it should be. Collecting this data without parental consent is very illegal and violates the Children’s Online Protection… Continue Reading →
https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true This is a study on bug bounties, which reward gig economy security researchers for finding flaws in corporate code, and demonstrates how economical these initiatives are. The study discovered that there is no discernible effect on the number of… Continue Reading →
There are 3 economic theories mentioned in module 11 that work together and apply to this letter. These theories are Laissez-fare economic theory, rational choice, and Marxian economic theory. The rational choice theory states that businesses make choices that occur… Continue Reading →
A cybersecurity analyst needs to understand both technology and people. They use psychology to predict and stop cybercriminals who trick others into sharing information. This job requires working well with others and being a part of a team to keep… Continue Reading →
To defend the security and sustain American influence abroad, leaders have to understand the upcoming discipline of social cybersecurity and how it impacts their force, nation, and values. Changes in communication and information flows have enabled the social cyberthreat: technology has… Continue Reading →
On a scale of 0-9, I scored a 2. The reason for this score is that using a distraction to help focus on another topic is not always negative. If an escape is needed to calm down, it does not… Continue Reading →
The media really affects how we see cybersecurity by how it talks about cyberattacks and data breaches. They often make big, dramatic stories out of them, making it seem like these incidents are always super dangerous. But they don’t always… Continue Reading →
Human integration in cybersecurity to me means how human behavior has influenced or changed technology/cyber. This is essential in the creation of cyber mechanisms as it can reduce human-made mistakes and increase an institution’s performance. Meme 1 (Top left corner):… Continue Reading →
*Please do not click on any links in this article* Fake websites seem easy to catch, but that is not always true. The difference between a fake and real website can be as simple as 1 added letter to the… Continue Reading →
References: Carole, J. (2021, April 8). Sex, Drugs and Toilet Rolls: How Cybercriminals Spend Their Money (infographic). HP Wolf Security. https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ Corfield, G. (2021, June 30). 8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019… Continue Reading →
There are 5 levels to Maslow’s Hierarchy of Needs. From top to bottom, the levels are self-actualization, esteem, love and belonging, safety needs, and physiological needs. I strive to work hard in everything I do and pushing myself to study… Continue Reading →
This site gives various statistics and laws regarding privacy rights and gives the most recent information on data breaches. Previous studies and documents are posted giving aspiring researchers insight and plans. Understanding and adding additional information regarding these breaches can… Continue Reading →
There are seven principles of science topics: relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. The principle of relativism explains how all things are related to one another. An example of this can be technology leading to cyberspace, new crime… Continue Reading →
One specialty that appeals to me most is digital forensics. This area intrigues me due to collecting the evidence after the attack and maintaining/preserving this for the officials to assist in the investigation. Looking into what can be found left… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑