Ethical Hacking As society is becoming more and more reliable on technology in their everyday lives, there are hundreds of threats that exploit these users. In order to find the weak link in a company would hire a ethical hacker. They discover the weak link that can open the gate to allow unauthorized access to…
Category: Cybersecurity & Social Science
Article 2 Review
The article to be reviewed has four authors who are Keren Snider, Ryan Shandler, Shay Zandani, and Daphna Canetti and it is called Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies. The article answers the question “What would it take to have a wide general audience accept government intervention in cybersecurity?” The thesis is answered…
Article 1 Review
The article to be reviewed is called Exploring Fraudsters Strategies to Defraud Users on Online Employment Databases. The research that was conducted in this article is to explore the tactics that fraudsters are using to fool a victim. The studies show methods that fraudsters used to pretend to be a legit employer/employment opportunity online. Additionally,…
Journal
Week 1: The career that appeals the most to me is security provision. I always had an interest in taking things apart and figuring out how something works. Therefore, I would really enjoy reverse engineering a malicious program and developing software to mitigate against it. The career that least appeals to me is investigating. I…