I took the Social Media Disorder Scale and scored a 3/9. I think the questions are very specific to certain people and I don’t think I know many people that would score higher than a five or six. I think… Continue Reading →
The media plays a significant role in shaping public perception and understanding of any career field, but especially in cybersecurity. Movies and TV shows frame cybersecurity specialists and incidents as major events that could lead to catastrophic events. They tend… Continue Reading →
https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs. “When companies are trying to incorporate more human workers over technology, but humans keep making more mistakes than technology”. My meme relates to human systems integration because it has been shown that humans make more errors manufacturally compared to… Continue Reading →
In the coming-up age of technology and the internet there are many fake websites and scams that many people tend to fall for. Many times you can tell if a website is fake and it may be a scam. Indicators… Continue Reading →
Maslow hierarchy of needs charts suggests that all humans have needs according to the chart. As we advance higher on the chart the more important our needs become. Lower levels needs are met like our physiological needs that keeps us… Continue Reading →
Personally I don’t believe there is any reason for anyone to commit cybercrimes. I think the first reasonable scenario is political reasons. Many countries have corrupt governments that suppress citizens birth right to speak up. They leaked videos of the… Continue Reading →
Science is a crucial in cybersecurity; from evidence-based understanding, analyzing, and security threats. Science in Cybersecurity is rooted in collecting data and drawing conclusions to such data to support your hypothesis. This is used to identify vulnerabilities in the network… Continue Reading →
The NICE Workforce framework provided by the government looks at the different areas of cybersecurity in public, private, and academic sectors. I would want my line of work to align with the investigative portion of cybersecurity. I have a passion… Continue Reading →
Researchers use sites like PrivacyRights.org to expand their knowledge of data breaches. These sites help researchers in finding patterns in breaches that may be common to the general public. This helps researchers develop and implement security protocols to mitigate data… Continue Reading →
© 2026 ePortfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑