Nahsenay Melesse. 10/02/2024 Article Review #1: Understanding the Use of Artificial Intelligence in Cybercrime

Introduction:This article review focuses on Choi et al.’s (2024) paper Understanding the Use of Artificial Intelligence in Cybercrime from the International Journal of Cybersecurity Intelligence and Cybercrime. This study examines how artificial intelligence (AI) is used in cybercrime, particularly deepfakes and social engineering, and suggests preventive measures. The review will explore how the article relates…

Article Review #2: Intimate Privacy Threats and Inclusive Design Nahusenay Melesse November 17, 2024

The article, Intimate Privacy Threats and Inclusive Design, published in the Journal of Cybersecurity, investigates the overlooked issue of privacy threats in intimate relationships, especially within shared environments. It challenges the traditional assumption that households function as unified privacy units and devices are exclusively personal tools. Through qualitative analysis and real-world examples, the study highlights…

Career paper

Nahusenay Melesse Cybersecurity Analysts: Bridging Technology, Society, and Social Science PrinciplesCybersecurity Analysts: Bridging Technology, Society, and Social Science PrinciplesCybersecurity analysts are essential defenders of the digital world, tasked with safeguardingsensitive data and securing infrastructure against ever-evolving threats. While technical expertiseis the cornerstone of their role, these professionals increasingly rely on principles from the socialsciences to…

journal 15

The speaker’s journey into digital forensics is both inspiring and insightful. Starting with a strongfoundation in computer science, they recognized the growing importance of cybersecurity anddigital evidence in modern investigations. This realization led them to pursue specializedtraining in digital forensics, combining technical expertise with an understanding of legal andethical considerations. Their career path underscores the…

Journal #13

Approaching the development of cyber-policy and -infrastructure in light of the “short arm” of predictive knowledge requires a flexible and adaptive approach that acknowledges the dynamic nature of cyber threats and technological advancements. Here are several strategies to consider: Risk-Based Approach: Adopt a risk-based approach to cyber-policy and infrastructure development, focusing on identifying, prioritizing, and…

Journal #12

Cyber technology has significantly transformed interactions between offenders and victims, reshaping the dynamics of crime and victimization in various ways: Increased Accessibility and Anonymity: Cyber technology has lowered barriers to entry for offenders by providing easy access to digital platforms and communication channels. Offenders can exploit the anonymity and pseudonymity afforded by the internet to…

Journal #11

The overlap between criminal justice and cybercrime lies in the investigation, prosecution, and prevention of criminal activities perpetrated through digital means. Cybercrime encompasses a wide range of illicit activities, including hacking, identity theft, fraud, online harassment, cyber terrorism, and child exploitation, among others. Criminal justice professionals, including law enforcement officers, prosecutors, judges, and forensic specialists,…

Journal #10

Developing Secure Network Architectures: Engineers design and implement secure network architectures that incorporate defense-in-depth principles, segmentation, and access controls to minimize attack surfaces and prevent unauthorized access. By carefully planning network topologies and deploying security appliances such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs), engineers create robust defenses against cyber threats.Implementing…

Journal #9

Safer: -Improved Communication and Emergency Response: Computers have revolutionized communication and emergency response systems, enabling faster and more efficient coordination during crises. Emergency services can utilize computer networks and communication technologies to receive real-time information, dispatch resources, and coordinate response efforts, ultimately saving lives and reducing casualties during natural disasters, accidents, or emergencies.-Enhanced Transportation Safety:…

Journal #8

Ensuring the safety of your computer is paramount in today’s digital age, where cyber threats lurk around every corner. Here are several ways to determine if your computer is safe:Up-to-date Antivirus Software: Installing reputable antivirus software and keeping it up-to-date is essential for detecting and removing malware, viruses, and other malicious software that may compromise…