Article: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/329/98 “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students” This article describes the factors and impacts of cyberbullying in a group of students located in the country of Jordan. This study utilized carefully formulated questionnaires in order to collect data from both students who had been cyberbullied and from students who had allegedly perpetrated cyberbullying….
CYSE201S – Article Review #1
Article: https://academic.oup.com/cybersecurity/article/8/1/tyac006/6590603?searchresult=1 “Developing metrics to assess the effectiveness of cybersecurity awareness program” This article describes the metrics utilized in assessing a cybersecurity program in terms of both information availability and action taken due to said data. The journal article utilizes information from many prior articles to synthesize a hypothesis regarding cybersecurity efficiency. This topic relates…
CYSE201S – Career Paper
Introduction One major career path taken by students of cybersecurity is a cyber security analyst. Cyber security analysts are responsible for auditing company devices and network infrastructure to prevent, mitigate, and respond to attacks in the company’s cyber systems. Salaries for cybersecurity analysts are typically in the range between $70,000 and $120,000. Generally, professionals in…
SCADA Systems; mitigating risks in Critical Infrastructure
Steps must be taken to ensure the security of SCADA systems in order to protect and maintain critical infrastructure in modern society. Introduction In the modern world, critical infrastructure systems are generally automated in order to mitigate the risk of human error. While this helps to ensure that the infrastructure does not get misused by…
Allocation of Funding and Resources Against Cyber Threats
Introduction In the modern day, cyber threats are exceedingly common in the business world. Between phishing attacks, brute force attacks, weak passwords, and security protocols not being accurately followed, there are many avenues for attackers to hinder business operations. I would argue that resources should be allocated 30% into technical protections and 70% into employee…
CIA Triad
CIA TriadThe CIA Triad is the framework used by businesses (unrelated to the Central IntelligenceAgency) to guide their cybersecurity efforts. The CIA Triad is an acronym, standing forconfidentiality, integrity, and availability. Confidentiality specifically means that all informationmust only be accessible by those authorized to see such information. Integrity means that theinformation is accurate, unaltered by…