Chinese Cyberattacks on European Governments
By Joshua Pisciotta Within the past year there has been many instances of different Chinese hacker groups targeting eastern European nations. These Chinese groups include Storm-0558, Mustang Panda, APT31, and many others. Their aim is to gather information from government embassies through analyzing emails or file exfiltration. Below are explanations on three examples of the…
Journal 6
Cybertechnology created opportunities in the workplace by making it easier for small businesses makes themselves well known. In the past small business would have to pay large amounts of money to put an advertisement on the yellow pages or on a local newspaper. However, with the use of the internet, they can now develop their…
Analytical Paper
Impact of Technology in the Industry The ease and popularity of computers is the fastest revolution the world has ever seen. It only took 30 years for the computers to completely replace humans in the industrial environment. Humans was doing all the hard labor for thousands of years. The men grew crops and livestock with…
Journal 12
Cybertechnology impact offender and victims by making it hard to detect who is doing the offending. If a fraudster tricked someone to send them money it is near impossible to track down who the offender is. With the aid of the internet, the fraudster makes a spoof website and sends out millions of emails to…
Career Paper
Ethical Hacking As society is becoming more and more reliable on technology in their everyday lives, there are hundreds of threats that exploit these users. In order to find the weak link in a company would hire a ethical hacker. They discover the weak link that can open the gate to allow unauthorized access to…
Journal 11
Cybercrime and criminal justice overlap in many ways. First, they both fall under the criminology discipline. Cybercrime can be defined through the lens of sociology like motivation and demographics. Then there needs to be an exact definition of what cybercrime is. How serious should the criminal charges be if a cybercriminal is founded guilty? How…
Journal 10
Cybersecurity engineers make networks safer because they are the ones that develop the code to make security technology safer. For example, if a computer user were to download firewall software then they are downloading a program that was developed by a cybersecurity engineer. Another example would be anti-virus software or virus scans. These programs are…
Journal 9
Computers have benefited our lives in many ways. It makes shopping easier. With a click of a button, someone can order their entire groceries list delivered right to their door. It also makes it easier to carry and read books since everyone can carry an entire bookshelf worth of books in the palm of their…
Article 2 Review
The article to be reviewed has four authors who are Keren Snider, Ryan Shandler, Shay Zandani, and Daphna Canetti and it is called Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies. The article answers the question “What would it take to have a wide general audience accept government intervention in cybersecurity?” The thesis is answered…