CYSE 201S Discussion Posts

Module 2 Discussion How does the principle of determinism relate to computer hacking? Clarifying information: Computer hacking is generally defined as intentionally accessing a computer without authorization or exceeding authorized access. I believe that determinism and computer hacking have several correlations. First, computers and applications themselves are deterministic. Their code determines their behavior and sets the…

Career Paper: Cybercrime Investigation

Cybercrime Investigators play a key role in the identification and analysis of digital threats. In addition to technical expertise, cybercrime investigation relies on applying social science principles to understand human behavior, societal influences, and cultural context. Professionals in this field must integrate concepts from criminology, psychology, and sociology into their investigative approaches. As cyber threats…

Article Review: Measuring the Human Ability to Spot AI Generated Images

The article I have chosen to review examines whether people can accurately tell the difference between real photos of faces and fake ones created by artificial intelligence (AI), also known as deepfakes. The researchers explore how well people detect deepfakes and whether hints can help improve accuracy. As deepfake technology becomes more sophisticated, this study…

Article Review: Cyberbullying on Social Media

The article I have chosen to review addresses cyberbullying on social media. The research seeks to provide a better understanding of how cyberbullying is defined across previous studies and how it is reported in regard to prevalence and impact. The researchers analyzed cyberbullying through systematic reviews and meta-analyses of existing studies on the topic. The…

The Price of Protection: Assessing Strategic Cybersecurity Budgeting

            Cybersecurity protections have become a necessary expenditure for companies in the digital age. Protecting company secrets and employee information is paramount. Depending on the industry, a company is also required to protect federally regulated information as well. A data breach can cause serious reputational and financial harm to an organization. Therefore, every effort must…

Industrial Resilience: Identifying Vulnerabilities in SCADA Systems

            As Industrial Supervisory Control and Data Acquisition (SCADA) systems have increased in popularity, they have become a growing target for malicious actors, requiring urgent attention to strengthen their defenses and ensure operational integrity. SCADA systems are used to control a wide variety of processes that manage our critical infrastructure, from electricity and water, to…

Framework for Cybersecurity: Exploring the CIA Triad

The CIA triad, standing for Confidentiality, Integrity, and Availability, is a model used to design information security policies. These three elements are considered to be the foundation to any good information security policy. Organizations can maintain safe and resilient systems by adhering to these three concepts as they design their data security program. Confidentiality refers…