Article 1

The Article I am reviewing is called, “Understanding the Use of Artificial Intelligence inCybercrime”. This article highlights the advancements of artificial intelligence and ways thatcybercriminals have used it to commit cybercrimes. The paper concludes that artificialintelligence is being used to create deep fakes that can be used in interpersonal cyberattacksand phishing attacks. The use of…

Article Review 2

Bug bounty policy creates a supply and demand for people who have the skills necessary to find ways to breach security. The policy is low risk to the company since if no vulnerabilities are found then you do not have to pay out. On the likely chance that someone does find something, you can patch…