How has cyber technology created opportunities for workplace deviance? NICHOLAS DENT CYSE 200T When speaking about workplace deviance in the present cyber world, the term can stem from many different aspects. However, primarily it stems from entertainment outside of the workplace and in a comfortable workspace. This is a significant issue because employees typically use…
Author: ndent002
The Human Factor in Cybersecurity
Nicholas Dent CYSE 200T When working within a limited budget as a CISO agent, I am tasked with balancing investments in cybersecurity technology. This is crucial for gaining and maintaining a strong defense against cyber threats. While both are essential, human behavior remains a significant vulnerability in the cybersecurity landscape. Therefore, resources being used must…
SCADA systems
Vulnerabilities and Mitigation of Critical Infrastructure systemsNicholas DentCYSE200TMarch 23, 2025 Introduction Supervisory Control and Data Acquisition (SCADA) can be characterized as industrial control systems (ICS). SCADA’s primary use is to manage infrastructure systems associated mainly with industrialization. The number of attacks on critical infrastructure in the US has surged in recent years in both private…
Journal Entry 15
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. This video relates to the social science of cybersecurity because of the use of human behavior, government policy, and the social impact…
Career Paper
Career Paper Nicholas Dent November 23 2024 CYSE 201S The cybersecurity career I will be choosing is a cybersecurity analyst. This job position’s main role is to monitor, analyze, and respond to cyberattacks. They work towards structuring and stabilizing security solutions, as well as the overall framework. Cybersecurity analysts depend on social science research and…
Article Review 2
Nicholas Dent November 15 2024 CYSE 201S Introduction This article mainly talks about the implementation of artificial intelligence (AI) on the internet and how it is growing very rapidly in today’s world. AI has had a big influence in this present day, with the typical use of it being utilized by students in school. Furthermore,…
Article Review 1
Article review #1 “Cyberbullying and Cyber Victimization during and before the Covid-19 Pandemic” Nicholas Dent September 26, 2024 Introduction The article I will be reviewing is titled “Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students”, by Nadya S. Neuhaeusler. To give a brief introduction, this article essentially talks about…
Journal Entry 14
Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The five violations that are most serious would include…
Journal Entry 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…
Journal Entry 12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. After reading this letter I would say that the two economic theories that correspond with it the most would be the laissez-faire economic theory and rational…