Artificial intelligence can be used to look for cyber threats and suspicious activity. AI systems use really hard algorithms to detect malware and detect ransomware attacks before they get worse. Ai is becoming essential for security measures as it can analyze a lot of data and track down cyber threats very fast. Detecting new threats…
Author: scobb007
Why do you think victims don’t report cyber victimization?
Victims of cybercrimes do not report it because they probably have the fear of not being believed or the fear of getting themself into trouble. They could have been somewhere online that they shouldn’t have been. Or there are probably scared that if they get that hacker in trouble one of that hackers’ friends could…
CNN Journal entry
In this video, CNN host Scott Galloway states that he would rather give his 14-year-old son a bottle of Jack Daniels and marijuana than an Instagram and a Snapchat account. This statement is an interesting way of demonstrating just how harmful social media can be to young children. I interpreted this statement as Scott Galloway…
ODU’s Electronic Communications Policy.
ODU’s electronic communications policy is connected to cybersecurity in many ways. The term cybersecurity refers to the state of being protected against the criminal or unauthorized use of electronic data, and that is primarily the end goal and reasoning for the issue of ODU’s electronic communications policy. The policy was put into place to protect…
Eleven Things Internet Users Do That May Be Illegal.
After reading the article by Andriy Slynchuk, I believe that the five most serious illegal actions on the internet are faking your identity online, bullying and trolling, recording a VoIP call without consent, collecting information about people younger than 13, and sharing passwords, addresses, or photos of others. Faking your identity is serious because you…
What does a Cybersecurity Analyst Do?
After watching the YouTube video, “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” the social behaviors that come out of being a cyber security analyst is not having a life. This job is 24/7 so it is good for people that do not have a family or that is just starting off…
In Scams we trust
After watching G4Choppa & G4 Boyz – “In Scam We Trust,” I have found that it relates to this class because most of the cybercrimes start off as scams. First off, these boys belong in jail, but an underrated cybercrime that no one looks at is something called fake scanning. People will literally walk up…
12-Year-Old Cyber Security Expert Ruben Paul
Reuben Paul, a 12-year-old from Texas, is a hacker and cybersecurity expert in just 6th grade. Reuben has completely embedded himself in the cybersecurity culture and most of what he does revolves around cybersecurity. Reuben includes cybersecurity in his day-to-day life as he hacks household items to demonstrate how they could be used to spy on…
Being a CISO for a Company CYSE 200T
CISOs are responsible for the security and integrity of a company’s Information network. If I was a Chief Information Security Officer for a public traded company, I would implement security strength. I would understand business risk better than anyone else and would be the best to understand new tools and solutions. I would do these…
Workplace Deviance CYSE 200T
Workplace deviance is the intent to harm a workplace, the behavior voluntarily violates norms and created threats to the workplace. There are 4 types of deviance, and they are production, property, political and personal aggression. workplace deviance has always been around but ever since the use of cyber technology, workplace deviance is safer for that…