On the Social Media Disorder i scored a 2 out of 9, I think this scale is a good way to assess the impact social media has on someone’s well being. Depending on where you are from and what kind… Continue Reading →
This guy has his hands up because he’s acknowledging his failure to have basic password safety practices. If only he used a different password for every website, he wouldn’t be in this predicament. This dog doesn’t seem very tech literate,… Continue Reading →
Comparison of Fake and Real Websites: Fake: Amaz0n.comReal: Amazon.com The fake website uses a zero instead of the letter “o” to appear like the real website. This is common method used in phishing scams to convince people who aren’t looking… Continue Reading →
Here is my ranking for the motives for cybercrime from least to most sensible:
Maslow’s Hierarchy of needs provides a framework for understanding how technology affects of basic human needs. At the most basic level, technology supports our physiological needs with the use of food delivery and grocery apps and health tracking apps. I… Continue Reading →
Researchers can use PrivacyRights.org to study various instances and reports of security incidents. Researches can use this information to analyze trends in the scale and the types of data compromised across different industries. This can be helpful in knowing which… Continue Reading →
The principles of science relate to cybersecurity mostly in the scientific method. It is a similar process to find vulnerabilities as it is to find how a dependent variable is affected by an independent variable. You perform a lot of… Continue Reading →
Personally I would go into the insider threat analysis since I’m interested in pen testing and analyzing security threats. I would also consider the secure systems development since I could use the coding knowledge that I am learning. If I… Continue Reading →
© 2025 Hamza Safdar — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑