Hi, my name is Chase i’m from Suffolk, Virginia. I’m majoring in Cybersecurity, on my free time I like to play basketball and shop for clothes. I also like to stay busy on the move so I will make up… Continue Reading →
After watching Davin Teo’s TEDx talk at the Hong Kong Salon, I was genuinely inspired by the unique and unexpected direction his career took. Originally trained as an accountant, Teo eventually found his calling in digital forensics—a field that, at… Continue Reading →
http://student.wp.odu.edu/cknig015/wp-content/uploads/sites/38148/2025/04/career-paper.docx by
In the article it outlines several online activities that users may unknowingly engage in, which could be illegal. Among these, five stand out due to their serious implications. Sharing someone else’s personal information: such as their address, photos, or passwords can lead… Continue Reading →
In the article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” by Kiran Sridhar and Ming Ng, the authors explore the effectiveness of bug bounty programs as a means of enhancing cybersecurity. The literature… Continue Reading →
Economic Theories: Cost-Benefit Analysis-This theory involves weighing the costs of potential cybersecurity measures against the benefits of preventing breaches. In the context of the breach letter, the company may have to assess whether investing in stronger security measures is worth the… Continue Reading →
A cybersecurity analyst’s job involves protecting an organization’s networks and systems from cyber threats, identifying vulnerabilities, and responding to incidents. This role is deeply connected to social behaviors, as it often requires interacting with different teams across an organization, management,… Continue Reading →
From reading what was on that link (military review) i understood that was the comparison between traditional cybersecurity and social cybersecurity. While the former deals with protecting information systems from hackers, the latter targets humans and society using psychology, persuasion,… Continue Reading →
I scored 2-5 on the risky usage and I feel like the items in the scale are good items.different patterns are found across the world in the context of social media and cybercrime is due to cultural differences and varied usage… Continue Reading →
After watching the video it got me thinking about how much the media shapes our understanding of this topic. The media plays a crucial role in informing the public about the dangers and complexities of cybersecurity. It often presents information… Continue Reading →
© 2025 Chase Knight — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑