Skip to content

Locky

Carl Lochstampfor Jr

  • Home
    • About Me
    • Certifications
    • Resume
      • Skills
      • Experience
      • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Networking & Programming
    • CYSE 300
    • CYSE 301
    • ECE 416
    • ECE 419
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W
  • Law & Ethics
    • CRJS 405
    • CYSE 406: CYBER LAW
  • Internship
    • CYSE 368
  • Cybersecurity Applications
    • CYSE 270
    • CYSE 280
    • CYSE 407
    • CYSE 494
  • Blog
  • News
  • Wikis
  • Contact

Category: Security

Ensuring Accessibility when Implementing the CIA Triad

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Human Factors Cybersecurity Engineering: Inclusive Design through Social Science

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Cyber Technology in Workplace Deviance

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Exploring Attacks on Availability: Rootkits

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Human Factors: A CISO’s Response to Human Error & Threats

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Search and Seizure Warrant ** MOCK **

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The “Human Firewall”

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Cybercrime: Using Psychological Theories to Understand & Prevent It

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Hacking Humans

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Victim Precipitation in Cyber Victimization & Potential Remedies

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Creating Cybersecurity Policies: Data Loss Prevention (DLP)

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Protecting Availability of Your Systems: A CISO’s Perspective

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
Translate »
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept