Davin Teo’s pathway into digital forensics is an interesting example of how careers in this field can appear unexpectedly. Initially hired as an accountant, Teo found himself drawn to information technology, which led him into the world of digital forensics…. Continue Reading →
Andriy Slynchuk describes several internet activities that can be considered illegal, with five standing out as the most serious. First, collecting information about children is a major concern, as it violates privacy laws and exposes minors to harmful content. Children… Continue Reading →
The article “Hacking for Good” by Kiran Sridhar and Ming Ng talks about bug bounty programs, where companies pay hackers to find problems in their computer systems. The authors used data from HackerOne to show that when companies offer bigger… Continue Reading →
The SAMPLE DATA BREACH NOTIFICATION letter can be explained using two economic theories and two social science theories. Economic theories: Social science theories:
A cybersecurity analyst’s job goes beyond just technical skills; it requires effective communication, teamwork, and problem-solving abilities. Being able to explain complex issues, like phishing threats, to people who do not understand cybersecurity is crucial. Analysts also need to manage… Continue Reading →
The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD, talk about the growing threats of cyber tools used to manipulate people’s beliefs and behaviors. With more people getting information… Continue Reading →
Upon completion of the Social Media Disorder Scale, I did not meet the requirements to be diagnosed as a disordered social media user. I only scored one out of nine. The one question I answered yest to is that I… Continue Reading →
The media influences our understanding of cybersecurity in many ways. We are constantly flooded with cyber-attacks, data breaches, and hacking incidents through the news, social media, and even word to mouth. One thing the media does right is that it… Continue Reading →
*Me when i win another new iPhone by clicking on a link* *”Oh man I love how free and open public WiFi is!”* *When you realize “Password1” wasn’t the best password choice* Each of these memes relate to human-centered cybersecurity…. Continue Reading →
Fake websites vs. Real websites Pay-pail.com paypal.com TiffanyCoShop.com Tiffany.com Piloltd.com Amazon.com There are many ways to spot a fake website. If you already know the name of the original website, then a fake website can be spotted easily if you… Continue Reading →
© 2025 Haleem Mitchell — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑