Skip to content

Locky

Carl Lochstampfor Jr

  • Home
    • About Me
    • Certifications
    • Resume
      • Skills & Experience
      • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493: Capstone Project
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Programming
    • CYSE 300: Intro to Cybersecurity
    • CYSE 301: Cybersecurity Techniques and Operations
    • IT 315: Intro to Networking & Security
    • CYSE 462: Cybersecurity Fundamentals
    • MATH
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W: Interdisciplinary Theory & Concepts
    • CYSE 418: Enterprise Information Assurance
  • Law & Ethics
    • CYSE 406: Cyber Law
    • CYSE 425: Cyber Strategy & Policy
  • Internship
    • CYSE 368: Cybersecurity Internship
    • CYSE 494: Entrepreneurship in Cybersecurity
  • Cybersecurity Applications
    • CYSE 270: Linux for Cybersecurity
    • CYSE 280: Windows System Management & Security
    • CYSE 420: Applied ML in Cybersecurity
    • CYSE 450: Ethical Hacking & Penetration Testing
    • CS 464: Network Systems Security
  • Blog
  • News
  • Wikis
  • Contact

Category: Accessibility

Ensuring Accessibility when Implementing the CIA Triad

Examines how to preserve accessibility while implementing the CIA Triad, ensuring systems remain usable, resilient, and secure without disrupting organizational operations.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Explores how human factors and social science inform cybersecurity engineering, focusing on inclusive design, usability, error reduction, and stronger security outcomes.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Internet of Things (IoT): Security Challenges

Explores key IoT security challenges, including weak authentication, poor patching, privacy risks, large attack surfaces, and vulnerabilities in connected devices.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ensuring Accessibility when Implementing the CIA Triad

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept