Cyber Analysts are the front line of cybersecurity, they are the ones that respond and react first. They are closely related to social cybersecurity as she talks about in the video. The analyst monitors networks and responds to smaller attacks on either the company or whoever it is you are working for. It is a…
Author: mroma005
Article Review 2
Michael Roman CYSE 201S 11/10/22 Prof. Armistead Article Review 2 For article review number 2 I chose a slightly different path that is less talked about and not a major problem until this year and the upcoming years. This problem and article that I want to talk about are about machine identity management and how…
Social Cybersecurity
Social Cybersecurity is one of the new upcoming items in the new and always-changing cyber world. This article shows and explains every new step there is to social cybersecurity and what exactly it is. In an odd way, it’s almost like a “therapist” to cybercrime, if that makes any sense. Social cybersecurity looks out for…
Social Media Disorder Scale
When taking the test I noticed a lot of the questions were on more of the extreme side of social media addiction and bad habits of having social media. On the test, I scored a 1.0 and according to the test if it was a 5.0 or higher I would have some sort of an…
Article Review 1
Michael Roman CYSE 201S 10/06/22 Prof. Armistead Article Review 1 For my first article review, I have chosen an article that can probably relate to most users of any windows software or computer. This article refers to people who like to keep their software up to date and on time with when they are released….
Hacking Scenes In Movies and TV
In this video, she is showing what exactly is real and what is just Hollywood being Hollywood. I personally think that no, no one could tell the difference in that extreme measure. If an average person were to watch any of these clips they would have no idea what is real and what is fake….
Ranking Individual Motive Articles
I will be ranking these from 1 to 7, 1 is making the most sense and 7 is making the least amount of sense. To start off I will begin by saying money is definitely number 1. Everyone loves money and the majority of the time people will try to find easy ways to make…
Maslow’s Hierarchy of Needs
Maslow’s Needs can compare very well to experiences with technology and just average life experiences. It starts off with physiological needs, the basics of food, water, warmth, and rest your everyday basic needs. This relates to your first phone, laptop, or even first piece of technology. You understand the basics and how to operate the…
Privacy Rights
Privacy Rights are something that always and will continue to be very important in the world of cybersecurity. Having data like this for researchers to use and have access to is great for the ones trying to defend their privacy rights and everyone’s information. This huge data chart has so many different categories that can…
Principles of Science/Cybersecurity
The principles of science aren’t the easiest to understand and comprehend on what exactly they are. According to the PowerPoint provided some studies of the sciences include, testing social theories, generating knowledge about topics related to the social sciences, and identifying recommendations for improving society. These topics are closely related to cybersecurity, for once testing…