How to Spot Fake Websites

There are several ways to spot a fake website and differentiate them from real websites. One of the best and most reliable ways to identify a fake website is by looking at the URL. Many times, fake websites will have websites with URLs that are one or two letters off the legitimate website. Often the…

Reasons for Committing Cybercrime

Motives for committing cybercrime can vary from person to person, with some motives being more sensical than others. The motives discussed are listed as for entertainment, for revenge, for recognition, for money, for political gain, boredom, or a combination thereof. As most crimes are committed for multiple reasons, I believe it makes the most sense…

Maslow’s Hierarchy of Needs and Technology

There are five segments of Maslow’s hierarchy of needs, and each of them relates to my experiences with technology. Starting from the bottom of the hierarchy are the physiological needs such as food, water, warmth, and rest. Although these needs are generally physical in nature, current technological advancements allow for provision of some of these…

Benefits of Privacyrights.org to Researchers

There are numerous resources on privacyrights.org at researcher’s disposal to conduct studies on data breaches. The most useful of these resources are the various reports available on data breach notifications within the US. Each year this website collates data on data breaches within the US to gain a better idea of trends, trouble areas, and…

Cybersecurity and the Principles of Science

Cybersecurity is a multidisciplinary science that gathers and implements numerous facets of other disciplines to create a holistic understanding of how technology interacts and influences individuals to commit cybercrime, as well as how we can protect against these attacks. The three pillars of cybersecurity, confidentiality, integrity, and availability, tie into all aspects of science, including…

Cybersecurity Through Pictures (And Video)

Below are 5 pictures that I believe not only illustrate my passion for Cybersecurity, but also the symbiotic relationship between society and technology as well as our need to protect it. Obtained from https://online.stanford.edu/programs/advanced-cybersecurity-program Obtained from https://healthitsecurity.com/features/top-mid-year-healthcare-cybersecurity-trends Obtained from https://builtin.com/cybersecurity/public-cyber-security-companies Obtained from https://www.securitymagazine.com/articles/99176-gaps-in-agency-cybersecurity-measures Obtained from https://www.strausscenter.org/events/hacker-culture-around-the-world/ In addition to the above pictures, the below video…

NICE Workforce Framework Personal Analysis

In looking at the NICE Workforce Framework, two areas in particular pique my interest the most. Those areas are: Protect and Defend, and Securely Provision. In general, I am highly interested in the idea of working to defend individuals and our nation, so any operational area that contributes to that end is where my interest…

Benefits and Risks of Use of Single Sign On (SSO)

Some of the largest benefits to SSO are that only a single logon is required to gain access to multiple applications or systems, it lends itself to warranting stronger passwords since only one logon is required, and the administration of the SSO is centralized and more easily controlled. Some of the disadvantages to SSO are…

Escalating Cybersecurity Incidents to Law Enforcement

There are a number of benefits and disadvantages to involving law enforcement to address cybersecurity incidents. There is a benefit to risk analysis that should be performed by the organization when considering this action. If the law enforcement involvement will compromise the integrity or structure of the business itself, it does not behoove the organization…

Differences Between a Threat and an Attack

The difference between a threat and attack is a threat is merely the presence of opportunity for an attack, whereas an attack is the use of a threat to carry out a specific action. Exploits relate to vulnerabilities because exploits are something an attacker can carry out once a vulnerability is found. Exploits can only…