Article Review #2 Understanding the Use of Artificial Intelligence in Cybercrime Matthew Burd 3/20/25 Understanding the Intersection of AI and Cybercrime Introduction – (BLUFF Heading) The growing role of artificial intelligence (AI) in enabling cybercrime is examined in the article, “Understanding the Use of Artificial Intelligence in Cybercrime” by Choi, Dearden, and Parti (2024). The…
CYSE201S Article Review #1
Article Review #1 Matthew Burd 1/28/25 An Analysis of the Impact of Cybersecurity and AI’s Related Factors on Incident Reporting Suspicious Behaviour and Employees Stress: Moderating Role of Cybersecurity Training Article Link: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/330/99 Introduction Muthuswamy and Esakki’s (2024) article, “Impact of Cybersecurity and AI’s Related Factors on Incident Reporting Suspicious Behaviour and Employees Stress: Moderating…
CYSE200T – Write Up – SCADA Systems
Matthew Burd CYSE 200T -Write Up- SCADA Systems Managing vital infrastructure, such as energy grids, water treatment facilities, and industrial operations, depends on Supervisory Control and Data Acquisition (SCADA) systems. However, because of their legacy security weaknesses and connectivity, these systems are increasingly being targeted by cyber attackers. SCADA applications improve operational security and efficiency,…
CYSE 201S – Journal Entry #9
On the social media scale, I scored a 0. I do not use social media, I do not trust it, I do not like it, and honestly, I do not care what you had to eat today. Regarding the questions, the Social Media Disorder (SMD) Scale appears to have fair and useful items for detecting…
CYSE 201S Journal Entry #8
Movies, in my opinion, have a significant impact on how people view cybersecurity, but they frequently misunderstand it. Hollywood frequently presents hackers as either evildoers wreaking havoc on the world or as brilliant individuals who can quickly breach any system. Hacking is made to appear slick and easy in films like Hackers and Swordfish, but…
CYSE 201S Journal Entry #6
Matthew Burd 2/17/25 Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent. Note: Don’t generate or click on unwanted/fake websites on your web browsers. Use examples…
CYSE 201S Journal Entry #5
Matthew Burd 2/10/25 Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. Since…
CYSE 201S Journal Entry #4
CYSE 201S Journal Entry #4 Matthew Burd Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. CYSE 201S A digital experience as a child influenced my outlook on technology. After my Steam account was…
CYSE 201S Journal Entry #3
CYSE 201S Journal Entry #3 Matthew Burd Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?Note: The word count should be in between 100 -125 words. One of the Publicly accessible methods I found was about Data Breach Chronology. The Data Breach…
CYSE 200T CIA Triad (Write Up #1)
Understanding the CIA Triad and the Role of Authentication & Authorization in Cybersecurity -Matthew Burd The CIA Triad (Confidentiality, Integrity, and Availability) is a fundamental concept in information security that ensures data protection throughout businesses. Encryption and access controls are examples of confidentiality measures used to prevent unauthorized access to sensitive information. Integrity ensures that…