1: Money. Everyone wants it and some do not care how they get it.2: Political. Because Power and Money go hand in hand.3: Revenge. When a bad actor does not get the money or power they want, then revenge is the next step.4: Recognition. Our world seems to be turning into a “look at me I am special” type of… Read more →
Category: Journal and Free Writes
Studying Data Breaches
PrivacyRights.org maintains a list of publicly available information about the various forms of data breaches. Their chronologic data base is divided by the type of breach. Studying the natural evolution of cyber attacks could yield valuable information into the changes in the trend analysis of currant in-use risk mitigation techniques. As these attacks continue to evolve, so too must the… Read more →
Principles of Science and Cyber Security
When asked what does cyber security mean to them, most people would respond with computer engineers, other high technical fields or hackers. This of coarse is understandable given the effect Hollywood has had on our cultural view of the cyber realm as a whole. However, what is often over looked is the simple footprint of human nature all over the… Read more →
Where I see myself within the Nice Framework
Out of the categories of the Nice Framework, I see myself falling within the Oversee and Govern category with my specialty area being within the Training, Education, and Awareness area. When I was working contracts for the US Department of State, I had the privilege of working in the training and standardization field for cross-unit close personal security within the… Read more →
CYSE201S Article 2
Michael J BradleyProfessor ArmisteadCYSE 201SArticle 2 Review“Cyber Terrorism Through Social Media: ACategorical Based Preventive Approach”Parlakkilic, Alaattin. “Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE, vol. 7, no. 4, 2018, pp. 172-178. Academic Search Complete. Accessed 05 Nov. 2022In the scholarly journal article “Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach.”… Read more →
Can we spot the fake?
CYSE201SAs we have expanded our digital footprint so too has the machinations of the criminal elements within our society. Cybercrime continues to grow and has become ever more sophisticated. The ability to easily spot fake websites has become more difficult. Gone are the days of shoddily made screenshots of an AOL or Yahoo sign in page designed to fish up… Read more →
CYSE201S Article 1
Michael J BradleyDr. Leigh Armistead CYSE201S Article Review“Exploring the Subculture of Ideologically Motivated Cyber-Attackers” Holt, Thomas et al.” Exploring the Subculture of Ideologically Motivated Cyber-Attackers.” Journal of Contemporary Criminal Justice, vol. 33, no. 3, 2017, pp. 212-223. Academic Search Complete, doi: 10.1177/1043986217699100. Accessed 01 October 2022 In the scholarly journal article “Exploring the Subculture of Ideologically Motivated Cyber-Attackers” Thomas Holt,… Read more →