The Russian propaganda apparatus, long directed at its society and the satellite states of the former Soviet Union is now aiming at targets abroad. In 2013, Gen. Valery Gerasimov identified information warfare as an essential aspect of Russian warfare going… Continue Reading →
1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again? Yes/No (Preoccupation). 2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance)…. Continue Reading →
Recently, I’ve realized the profound impact the media has on shaping our perceptions of cybersecurity. The media often amplifies the sense of urgency and fear surrounding cyber threats through sensational headlines and dramatic narratives. This can lead to heightened awareness,… Continue Reading →
Image three: The meme is when you successfully catch a hacker who tries stealing someone’s information. In the picture, the individual sits in a chair with a laptop, smiling at the camera. I believe in the individual’s head; he is considering… Continue Reading →
The first fake website I found was a website pretending to be Amazon. I figured this website was fake because it was misspelled when I looked at how Amazon was spelled, like “amaz0n” on the URL. The correct way to… Continue Reading →
I would rank entertainment crimes as number 7 on the list because entertainment crimes are not as severe as the other crimes on the list. Political crimes are number 3 because they are more severe than most, and politics is… Continue Reading →
From bottom to top, Maslow’s Hierarchy of Needs includes physiological, safety, love/belonging, esteem, and self-actualization needs. Physiological: My smartphone lets me order food and water delivery, addressing basic needs without leaving my home.Safety: Security systems and apps I use provide… Continue Reading →
Researchers might leverage the information from a site like PrivacyRights.org to study data breaches by comprehensively analyzing the breaches’ characteristics and consequences. By examining incident reports, researchers can discern patterns regarding breaches, the types of data targeted, the industries most… Continue Reading →
Science principles like observation, hypothesis formulation, and experimentation are integral to cybersecurity. Observation is crucial in cybersecurity for monitoring network activities and identifying potential threats or anomalies. Security professionals constantly observe system behaviors and log data to detect irregular patterns… Continue Reading →
My Career framework I would focus my career on Cyber Defense Analysis. I chose this one over the rest because the whole reason why I chose cyber security was to stop hackers and stop people’s information from getting stolen, and… Continue Reading →
© 2025 Eportfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑