A Deep Dive into the 2012 LinkedIn Data Breach: Vulnerabilities, Exploited Threats, and Lessons for CybersecurityNadia SimpsonOld Dominion UniversityCYSE300Malik Gladden9/10/2023 On June 6, 2012, LinkedIn, one of the world’s largest professional networking platforms, became the target of a massive cybersecurity breach that compromised the data of millions of its users. This data breach, which primarily …
Category: Uncategorized
Mar 04
Reflection
After years of hard work and perseverance, I am finally preparing to graduate from ODU with a bachelor’s of science in cybersecurity. However, my journey to this port in my life has not been easy. When I transferred to ODU in 2022, I faced one of the challenging periods of my life. I was suffering …
Mar 03
Assignment 6-File Permissions
Step 1. Create three groups- employee, payroll, and admin. (You may refer to the slides forweek-4 – Group Management) Step 2. Create three user accounts with a specified home directory for Sophia, Olivia, andEmma. Set the primary group for Sophia, Olivia, and Emma to “employee”, “payroll”, and“admin”, respectively. And change their login shell to /bin/bash. …
Mar 03
Assignment 1
Mar 03
CS462 Term Report: Colonial Pipeline
CS462 Blog Post Background of Colonial Pipeline The Colonial Pipeline Company is a critical entity in the U.S. energy sector, which operates the largest refined products pipeline system in the nation. The company was founded in Alpharetta, Georgia in 1961 and the pipeline was fully operational in 1964. The Colonial Pipeline supplies fuel to most …
Mar 02
Homework 12
Short Answer Questions (short answers should generally be at least three to four sentences in length. However, it is important to be as concise as possible when responding.) or you may choose to Upload a Two-Minute Audio or Video recording to answer the following questions. Listen to “Episode #86: The LinkedIn Incident of the DarkNet …
Mar 02
Homework 10
Short Answer Questions (short answers should generally be at least three to four sentences in length. However, it is important to be as concise as possible when responding.) or you may choose to Upload a Two-Minute Audio or Video recording to answer the following questions. Module 7 & 8 1. What are the main problems related to fragmented files? The …
Mar 02
Homework 5
1. Discuss the differences between physical switches and virtual switches. A physical switch is a hardware device that connects multiple computers, servers, or network devices within a local area network (LAN), allowing communication between them. A virtual switch, on the other hand, is a software-based switch used in virtualized environments to facilitate communications between virtual …
Mar 02
Article Review 2
The article reviewed, Cybercrime Fear Among Young Adults: Psychological and Social Determinants, published in the Cybercrime Journal, explores the factors influencing fear of cybercrime among young people, particularly college students. This study is relevant to social science principles as it examines the psychological and societal impacts of cybercrime victimization and highlights how social media contributes …
Mar 02
Article Review 1
The article reviewed is titled “Victimization of Deepfake in the Metaverse: Toward a Practical Management Framework and is published in the International Journal of Cybersecurity and Cybercrime. The article relates to principles of social science because it addresses the ways deepfake technology affects societal structures, particularly in terms of victimization and inequality. It highlights how …