Davin Teo’s pathway into digital forensics is an interesting example of how careers in this field can appear unexpectedly. Initially hired as an accountant, Teo found himself drawn to information technology, which led him into the world of digital forensics…. Continue Reading →
The Career There are a lot of career opportunities in the cybersecurity field, and one that really stands out is ethical hacking. Ethical hackers are responsible for testing an organization’s systems to find any security weaknesses. They are basically known… Continue Reading →
Andriy Slynchuk describes several internet activities that can be considered illegal, with five standing out as the most serious. First, collecting information about children is a major concern, as it violates privacy laws and exposes minors to harmful content. Children… Continue Reading →
The article “Hacking for Good” by Kiran Sridhar and Ming Ng talks about bug bounty programs, where companies pay hackers to find problems in their computer systems. The authors used data from HackerOne to show that when companies offer bigger… Continue Reading →
The SAMPLE DATA BREACH NOTIFICATION letter can be explained using two economic theories and two social science theories. Economic theories: Social science theories:
Article Review #2: The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study Social Science Principals This article relates to the principles of objectivity and parsimony. The objectivity refers to the… Continue Reading →
A cybersecurity analyst’s job goes beyond just technical skills; it requires effective communication, teamwork, and problem-solving abilities. Being able to explain complex issues, like phishing threats, to people who do not understand cybersecurity is crucial. Analysts also need to manage… Continue Reading →
The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD, talk about the growing threats of cyber tools used to manipulate people’s beliefs and behaviors. With more people getting information… Continue Reading →
Upon completion of the Social Media Disorder Scale, I did not meet the requirements to be diagnosed as a disordered social media user. I only scored one out of nine. The one question I answered yest to is that I… Continue Reading →
The media influences our understanding of cybersecurity in many ways. We are constantly flooded with cyber-attacks, data breaches, and hacking incidents through the news, social media, and even word to mouth. One thing the media does right is that it… Continue Reading →
© 2025 Haleem Mitchell — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑