Zero trust means 100% protection.
Rapid Detection: “Organizations with automated threat detection systems can mitigate breaches 27% faster than those without.”
Cybercrime ROI: “For every $1 invested in proactive cybersecurity measures, businesses save up to $9 in breach-related costs.”
Ransomware Impact: “A business falls victim to a ransomware attack every 11 seconds. Backups and proactive defenses are vital.”
Stay ahead of threats; innovation is your shield.
IDS 493 Electronic Portfolio Project
Course Description: The preparation of an electronic portfolio integrating the student’s academic study, work experiences, skill identification and work products. Alternative formats are used for varying uses of the portfolio.
Impact of Cybersecurity
The advancement of technology has guaranteed that it plays a significant role in our lives. We utilize it throughout the day as part of our everyday routine. This phenomenon demonstrates our reliance on ever-strengthened technology. Moreover, the digital revolution has transformed and continues to affect the world and our lives. Even though technological improvements have a positive impact on our lives, there is overwhelming evidence that digital technology might have a harmful impact on human behavior, ethics, and small businesses.
Human Behavior: Cyber Stalking/Cyber Harassment
According to Hazelwood and Magnin (2013), cyber stalking and cyber harassment have become widespread issues that demand criminologists’ and criminal justice experts’ attention. Although there are no nationwide assessments of the scope and pervasiveness of these crimes, research of various towns and universities raises concerns. The Department of Justice (1999) estimated that roughly 20% of stalking cases in Los Angeles and 40% of stalking cases in New York used the Internet as the medium for this criminal conduct in a discussion of the scope of cyber stalking. According to recent research, over 40% of college students have experienced cyberstalking at some time in their life (Reyns et al., 2012). Based on these figures, as well as the rising usage and availability of electronic gadgets, I think it is apparent that cyberstalking and cyber harassment deserve the criminal justice system’s attention.
Cyber Harassment (CH)
Cyber harassment entails tormenting, annoyance, terrorizing, offending, or threatening an individual over email, instant chat, or other means with the purpose of injuring that person. Harassing communications includes all aspects of conventional harassment, but also includes the use of technological devices to send messages that make a person feel personally targeted for damage. Creating a Facebook account in someone else’s name and using that profile to insult others is an example of CH. Additional instances of CH include sending improper text messages (e.g., of a frightening or sexual nature) or building a website with photo-shopped photographs of an uninformed individual engaged in sexual actions (Hazelwood & Magnin, 2013).
Cyber Stalking (CS)
Cyberstalking is defined as “the repeated pursuit of an individual utilizing electronic or Internet-capable devices” in its simplest form (Reyns et al., 2012, p. 1). Any unsolicited electronic messages that are threatening, coercive, or frightening are considered repeated pursues. In the end, stalking is a crime that causes the victim to feel dread, terror, intimidation, tension, or worry. The victim may lose a sense of control over his or her own life as a result of the stalker’s repeated nature, as the victim never knows when the stalker may emerge or contact him or her again. The stalker’s ability to access the victim at any time and from any distance undermines the victim’s feeling of security and can lead to a perpetual state of terror (Hazelwood & Magnin, 2013).
IDS 493 Electronic Portfolio Project
Welcome Page: My Journey as a Program Assistant and Intern
Welcome to my ePortfolio, where I reflect on my experiences and growth during my internship as a Program Assistant at the Brooks Crossing Innovation Lab. This platform serves as a collection of my work, highlighting my skillsets, accomplishments, and the various activities I have been involved in over the past few months. Below, you will find my personal narrative essay, followed by a detailed breakdown of the key skills I have developed, supported by artifacts from my internship. Each skill has been examined with real-world examples, providing insight into the practical applications of my learning and how I have contributed to the success of the projects and initiatives I was involved in.
Key Experiences
Engaging K–12 Students in Cybersecurity Education
Building on my role at the Brooks Crossing Innovation Lab, I taught hands-on sessions designed to introduce K–12 students to the fundamentals of cybersecurity. Using interactive tools and relatable examples, I demonstrated how everyday activities, such as creating passwords and avoiding suspicious links, contribute to digital safety. These sessions were designed to:
Spark interest in technology and cybersecurity careers.
Empower students with skills to protect themselves online.
Highlight the societal impact of cybersecurity practices.
Stay connected.
Welcome to a platform where cybersecurity becomes more than a skill—it's a passion. Let's embark on this transformative journey together. Welcome aboard, Cyber Defender!