Posts

Evaluation Post

Image
This evaluation post looks back at what we gained from our research and understanding of Cyberattacks and the process of making it:) It all began with the planning phase, as I commenced working on this project on April 16th with the intention of completing it by May 20th. Initially, I focused on delving into the topic and crafting the introduction by gathering all necessary information and identifying the most reliable sources for research. Following this, I proceeded to outline the key information to be included in the blog. Once the research phase was complete, I conducted a progress report meeting. Subsequently, I transitioned to the actual creation and design of the blog, ensuring that it adhered to all specified requirements. I trust you've found this blog beneficial and that it inspires you to take action in fortifying your cybersecurity measures!

Secondary Research Post

Image
 Exploring and Analyzing About CyberAttacks Here I will conduct a secondary research by exploring research articles and any reports that studies cyberattacks, I will find you verified sources to provide good understanding about Cyber-Attacks. A cyberattack is an attempt by cybercriminals, hackers, or other digital adversaries to access a computer network or system, typically to alter, steal, destroy, or expose information. These attacks can target a wide range of victims, from individual users to enterprises or even governments. Heres a main overview of a main academic article study thats talking about cyber attacks. Enterprises rely heavily on computerised information systems and electronic data in cyberspace to carry out their daily activities and business operations. Nowadays, virtually all public and private organisations are connected to and operate within cyberspace. As computers, information systems, and networking have become more widespread, cybersecurity has become increasing

Primary Research Post

Image
Primary Research on CyberAttack To make a primary research i will be forming a google form about cyberattacks where 10 other students will answer it, this is the link incase you wanna give it a try. ( Google form about CyberAttack ) Heres my feedback about the google form: Most students don't take their security seriously until they encounter a problem. However, I am pleased to see that nearly all of the students who responded to the form have a good general understanding of what to do and what not to do regarding their security. For example, in one of the questions where I inquired about public Wi-Fi, many of them were aware that connecting to public Wi-Fi and using sensitive information while connected is a risky decision. Overall the google form was successful and I got the information needed to make this research post. References: Google form about CyberAttack

Welcome Post

Image
Welcome to my blog talking about CyberAttacks! Im Abdulaziz Owair, A student in DMU majoring in CyberSecurity. In the current digital era, it is crucial to protect our online identity. People must educate themselves in order to safeguard their online identity , data , and privacy in light of the growing frequency of cyber threats and online vulnerabilities. Im very interested in dinosaur's ,  history and real life  and virtual security. I've read a ton of material regarding artificial intelligence from a variety of sources, and while it can be beneficial, it can also be destructive to humans. For this reason, I'm curious about how IT will impact people in the future. One of the biggest issues facing AI is its potential to displace people in a range of professional capacities. The increasing usage of artificial intelligence (AI) raises concerns about job displacement, unemployment, and the possibility of worsening economic inequality despite the technology's many benefit

Introduction Post

Image
Overview Of CyberAttacks Welcome to my second post I will be talking about a current issue in IT known CyberAttacks. My purpose in investigating cyberattacks is to gain an understanding of the tactics that cybercriminals may employ, as well as their thought processes and capabilities through the analysis of previous case studies. Cyberattacks, despite their often unfavorable perception, can drive breakthroughs in cybersecurity. Anderson, Ross, and Moore (2019) claim that because these assaults highlight flaws in systems, businesses and governments are compelled to invest more in advanced security measures and stronger defenses. By exposing vulnerabilities, cyberattacks motivate proactive measures to strengthen defenses against potential threats. Furthermore, as McAfee points out in its 2021 Cyber Threats Report, information gleaned from studying cybercriminal tactics may aid in locating and addressing previously unidentified vulnerabilities, ultimately leading to a more secure digital