The Department of Defense was the first government organization to incorporate Human Systems Integration into their engineering and project management framework. The way the Navy has integrated HSI into their engineering practices has created systems which are very robust. In doing so, they have also created a generation of Sailors that has very few actual…
Category: CYSE201S
Fake Websites
Exploration into the world of cyber-crime will undoubtedly take you to some pretty shady places. It will also take you to some websites that seem legitimate, but provide bad actors the ability to take something from you. Whether that be banking account information, passwords, or more personal data, fake websites are a path used. I…
Article Review 1
Mohammad Asfour and Juan Carlos Murillo of Cornell University conducted a case study to identify how simulated human targets respond to social engineering attacks, specifically phishing. This was done with the goal of getting a better understanding of the human factors that influence the success rate of social engineering attacks. The case study used OpenAI’s…
Cyber Criminal Motives
Motives to commit cyber crimes range from the innocent to the obscene. Of the infinite number possible, I have scaled it down to seven motives: entertainment, politics, revenge, boredom, recognition, monetary gain, and a general self dissatisfaction (ego and socioeconomic and psychological factors).Some of these motives subjectively make more sense than others, which I discuss…
Maslow’s Hierarchy
Maslow’s Hierarchy of Needs explains that human needs exist within a hierarchy, and when our lower-level needs are met we begin to focus on the higher-level needs. Growing up in the late-1980’s and throughout the 1990’s I can look back at my experiences with technology and see, at least from my perspective, that the world…
A Holistic View of Data Breach Research
The types of data that States require companies and state and local agencies to protect as personal information, and each States’ reporting requirements are useful variables for researchers to leverage when reviewing breaches holistically. For example: a government’s emphasis on protecting the information can have a clear implication on a given population’s vulnerability. States with…
Principles of Social Science
The principles of science and scientific research are relevant to the study of cybersecurity and find a place in the everyday lives of cybersecurity professionals which I discuss here. Starting with determinism; just as history is said to repeat itself, a deterministic view of cybersecurity will assist DevSecOps professionals and network engineers to design systems…
NICE Framework
Upon review of the NICE Workforce Framework, I am most interested in the specialty areas of exploitation and systems analysis, systems development, and technology research and development. Based on these interests, I intend to focus my career on systems expertise and exploitation. The aforementioned specialty areas interest me the most because they involve reviewing large…