Social Cybersecurity

Modern-day warfare has changed a lot in these modern days as cybersecurity is now a crucial part of warfare and the DOD has specifically been forced to defend the security of this nation. Namely, information warfare is rising looking to states and third parties as nations can very easily manipulate information leading to distrust within…

cybersecuity analyst

Becoming the first line of defense you will be the front desk for the companies of corporations when becoming a cybersecurity analyst. Providing guidance and employee training is one of the jobs and crucial for keeping the network secure as human factors are the highest risk and vulnerability when it comes to cybersecurity. A theme…

Social Media and Cybersecurity

When taking the Social Media Disorder Scale I found myself answering yes to a lot of the questions making me think about how addicted I am to social media. This was very surprising to me as I didn’t see myself as someone who was extremely addicted to social media. To be diagnosed as a disorder…

How the media influences our understanding of cybersecurity

Movies specifically have a huge societal impact on the population as they portray cybersecurity. In most movies, it is portrayed as very easy, unrealistic, and has a significant lack of code. It is very apparent that this portal is used just for the entertainment of the audience Another key issue with these movies is how…

Cybersecurity memes

When you’re part of the human firewall When you’re reading the regulations and standards When you finally finish applying the regulations and standards Privacy when coding just like how private the network is Team culture about safeguarding Me when the system feedback is positive analysing a user fall activity The real risk of networks/systems training…

Fake websites vs. Real websites

Fake websites mimic real websites to steal someone’s financial or personal information. Many ways to make a fake website such as a weird domain name, lackluster design, and lack of reviews online. There are other apparent issues with fake websites but a majority can be figured out with some analysis. These are some examples of…

Maslow’s Hierarchy of Needs and how they relate to technology 

In relation to physiological needs are primarily essentials that are needed in order to survive such as food and water. Technology enables applications such as sleep apnea machines which keep people alive during sleep. Other technology would include safety features such as a ring doorbell which makes it possible to see who’s at your front…