A Career as a Cybersecurity Awareness Specialist What is a career as a Cybersecurity Awareness Specialist? Cybersecurity awareness experts have a responsibility, in educating both individuals and organizations. To deal with dangers. Reduce their impact effectively by meeting the requirements of various groups involved in the field of Cybersecurity Awareness Specialists lean significantly on social…
Author: khenl001
Article Review #2
Privacy Threats in Intimate Relationships How do Privacy Threats in Intimate Relationships relate to the Principles of Science? I believe that privacy threats in intimate relationships can relate to the principles of science in a one way, that way being determinism. Determinism is when human activity is predetermined. I believe that within most intimate relationships,…
Article Review #1
Cyber Victimization in the Healthcare Industry: Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT) How does Cyber Victimization in the Healthcare Industry relate to the Principles of Science? Cyber victimization in the healthcare industry can relate to the principles of science in quite a few ways. One of the…
Journal Entry 15 – Davin’s Pathway to Digital Forensics
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. In the following video, Davin described his pathway to becoming an expert in digital forensics. He stated when he first started out,…
SCADA Systems
Critical infrastructure systems are facilities and assets that are critical to the functionality ofsociety. Supervisory Control and Data Acquisition (SCADA) systems control, monitor, and analyzeindustrial, facility-based, and industrial systems. Vulnerabilities of SCADA Systems Although SCADA systems improve the efficiency of critical infrastructure systems, it alsointroduces vulnerabilities that attackers exploit. Like all other systems, they are…
Hacking Humans Writeup
Read the following article and write a 250 word summary/take away from it. https://drive.google.com/file/d/17vZTrd3tyRkIuXtLfYKSeZypU7WpCkmM/viewLinks to an external site. Hacking Humans Article Summary Digitalizing DNA has its pros and cons. Some of its pros include helping medical research, by finding cures to fatal illnesses. However, do the cons outweigh the pros? Imagining your DNA being stolen…
The CIA Triad
I have conducted research from multiple articles to be able to best explain the following topics:“What does the CIA Triad stand for?” “What is the CIA Triad?” and “Authentication vsAuthorization”. What does the CIA Triad stand for?The CIA triad stands for confidentiality, integrity, and availability. To avoid confusion with theCentral Intelligence Agency it is sometimes…
The NIST Cybersecurity Framework
The NIST Framework is a set of guidelines that can help organizations by securing their critical infrastructure and improving their ability with identifying, preventing, detecting, responding, and recovering from cyber incidents. Overall, the Framework is used for reducing and managing cybersecurity risks, which greatly benefits all organizations. Using this Framework helps organizations, no matter the…
Journal Entry 14 – Eleven Illegal Things You Unknowingly Do On The Internet
Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. After reviewing the eleven things Internet users do that…
Article Review 2 – Privacy Threats in Intimate Relationships
How do Privacy Threats in Intimate Relationships relate to the Principles of Science? I believe that privacy threats in intimate relationships can relate to the principles of science in a one way, that way being determinism. Determinism is when human activity is predetermined. I believe that within most intimate relationships, privacy threats are inevitable. I…