Article Review 2: Understanding the Connection Between Hackers and Their Hacks:Analyzing USDOJ Reports for Hacker ProfilesThis study’s research question aims to investigate whether a connection exists betweenthe age, gender, and nationality of hackers and the attributes of the hacks they carry out. Toachieve this, the research examines press reports from the United States Department of…
Article Review 1
My article review will be from the Journal of Cybersecurity titled, “Developing metrics to assess the effectiveness of cybersecurity awareness program”. This article explores an awareness program’s effectiveness on its audience by providing proposed metrics of which to base a programs effectiveness on in order to help companies make the best decision on choosing to…
PrivacyRights.org
Week 3 Journal Entry: PrivacyRights.org is a website that publicly lists information about data breaches. This website can be very useful for researchers in the cybersecurity field because of all the different information that can be taken from it. There are different filters on the homepage that dictate the date, location, and type of data…
NICE Workforce Framework
Week 1 Journal Entry: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The most desirable areas of the NICE Workforce Framework for me personally would be (in no particular order)…
The Principles of Science and Cybersecurity
Week 2 Journal Entry: Google defines science as, “the systematic study of the structure and behavior of the physical and natural world through observation, experimentation, and the testing of theories against the evidence obtained”, Using this definition it is clear see that the principles of science relate to cybersecurity in the way that most cyber…
SCADA Systems
Write-Up- SCADA Systems Name: Max Amici Date: 10/31/2021 Supervisory control and data acquisition, otherwise known as SCADA, is an industrial control system that is used in infrastructure processes, facility-based processes, and industrial processes. Essentially, these systems allow operators to access data and manage equipment when needed as it is a strong system that collects, analyzes,…
The CIA Triad
The CIA Triad Max Amici 9/21/2021 The CIA triad is a security model used for information that can help organizations keep their data secure. The letters in CIA stand for confidentiality, integrity, and availability. It is helpful to think of the triad as a way to make sense of the wide array of security software,…
The Human Factor in Cybersecurity
Write Up- The Human Factor in Cybersecurity Max Amici 10/17/2021 After being exposed to two viewpoints regarding human contribution to cyber threats, it has made me realize that for the most part cyber threats are created and amplified by humans themselves. In Capone’s article about the impact of human behavior on cybersecurity, he talked…