Skip to main content

Posts

Showing posts from May, 2023

Initial Project Plan (Gantt Chart Update)

 Here is the information updated containing new topics and new dates based on my worktime. (Author's Work)

Software (Example)

  Here is a quick demonstration about how writting a small amout of code you can actually see on right screen the "This is a demonstration" which is written on left screen as a code. this is by doing the next steps: 1. Create a new file which all the HTML will be written, because all the CSS will be on its proper folder. 2. Write the code/structure where all the head and body will be be, you can simply write a short command such as "!" and VS Code write the structure for you. 3.Write inside the "<p>" which stand for "paragraph" the phrase or word you want to write.  And done, you have create an HTML document and write your first code. 

Software (Evaluation-Functionalities)

  On this section we will see the four main parts that Visual Studio Code it is compound. 1. Activity Bar: It is located on the left-hand side, this lets the user switch between differnet views and   you can get easily acces to the plugins from the activity bar as well. 2. Sidebar: Contains different views like the explorer to assist while working on the project and many extensions are given from the sidebar inside this sidebar you can do: - Group related views and content together  - Use clear and descriptive names for containers 3. Editor: This is the main area where all the ideas are put here to edit your files, you can open different editors as you like. 4. S tatus Bar: Information about the opened project and the files a person edit. References: Microsoft (2021a) UX guidelines, RSS. Available at: https://code.visualstudio.com/api/ux-guidelines/overview (Accessed: 30 May 2023). Microsoft (2021b) Visual studio code user interface, RSS. Available at: https://code.visualstudio.com/

Software (Overview)

  (Source: https://stackcodify.com/2021/06/vs-code-extensions-for-faster-coding/) Visual Studio Code has an imprevise millons of active users (infoworld.com). It is a free software that helps a lot of professional and non professional to write code, either for programming or for simple porpuses as curiosity, it is free which means that anyone can download and test it from their own operating system such as Windows, macOS, Linux and Rasperry Pi OS. The good thing about this code editor is that it is always getting updated and supported by the own large community and fans al around the world, also it is open source which means anyone can add code to it so the possibilities are endless for every user. References: Heller, M. (2022) What is visual studio code? Microsoft’s extensible code editor, InfoWorld. Available at: https://www.infoworld.com/article/3666488/what-is-visual-studio-code-microsofts-extensible-code-editor.html (Accessed: 30 May 2023). Mandeep (2021) VS code extensions for f

Primary Research Questionnaire (Google Forms)

 Here is the complete questionnaire needed, and the link provided ;  https://forms.gle/Ba6sLGWhXHcXxb7X9 The total amount of questions on the survey were ten, this questions vary from age, employment and themes related to cybersecurity.

Primary Research (General Questions Analysis)

The total amount of answers were 17 responses in total.  The chart show that a total of 94.1% mention that they have heard about cybersecurity, meanwhile a 5.9% said a questionable "Maybe". It is mention a variety of topics are people related to cybersecurity,  58.8% has related anti-viruses with cybersecurity, while Network 52,9% , Security Awareness and Malwares/Threats share the same idea. It is also shown 17.6% did not relate any of the topics mentioned. The chart shows answers regardless third parties having access to personal information, a 50% has agree of giving access, meanwhile a 25% reject the posibility. It also shows a 25% not sure about have ever done it.  T his question is letting people know if they believe Cybersecurity should be something important and something to pay attention, 87.5% has said yes while 6.25% said a no. The same amount of people said that are not entirely sure. An impressive porcentage of 47.1% has said that they are not sure, a 17

Primary Research (Demographic Questions Analysis)

Here are all the answers related to demographic questions. It is shown that 64.7% of the results are Male while the 35.3% are Female.  In general it shows that 29.4% are 30 years or above, The rest is 58.8% are 18-24 years old, which shows that there are more younger people that answer this survey. I had to delete two answers from the survey because it shown unapropiate answers which some students wrote, 71% said are students while the rest are having full time or part-time job.

Diagram 2 - draw.io

CYBER SECURITY DIAGRAM 2 (Related to my Major Project Theme) Computers, Smart Devices, Telephones and Smart houses are connected so a server. Servers are linked to a protected protocol of security. The protocol leads to the main storage.   (Author's work)

Diagram 1 - draw.io

  ARTIFICIAL INTELLIGENCE DIAGRAM 1 Imagine Recognition. Learning and Processing The Information. Conversation and Human Interaction. Storage The Information. (Author's work)

Student Ideas

 My Ideas in general about the Blog It was a long and great experience doing the blog, it was the first try that I experience doing a questionnaire or even a case study, I just would like to add that I hope to see more assesments like these because involves creativity and proving your own ideas to someone that would like to check your blog.  I have learn a lot about Cybersecurity and Artificial Intelligence because I spend quite time doing investigation so It was all worth the time and sometimes hours on it. 

Case Study

NNeuralink   The human brain is an incredible pattern-matching machine (Jeff Bezos), The founders of Neuralink are Elon Musk a well-known Executive Officer of Tesla Motors, and Max Hodak but this last one decide to leave the project in 2021. The principal aim of Neuralink is to create device that would be connected to the brains in order to help quadriplegic people to accomplish simple tasks that they were not able to do previously and of course this means a surgical procedure, this case study will talk about the aims of Neuralink and how can be so beneficial for our society in order to identify key themes and results.   The procedure is very complicated, and it needs the help of a precise equipment, the implant is inserted on a hole in the skull created by a robot and the implants are then embedded In the cortex, all the procedure can be done in 30 minutes, all of the procedure were never done on humans (livescience, 2023). Although the first Neuralink’s attempt to gain the approval o

Academic Paper Summary

  (JFIA, 2022) According to this Academic Paper “Cybersecurity and Data Privacy: The Rising Expectations Whitin Internal Audit” It is mention that the lack of protection and breaches in security  results in poor image for the company and most important a loss financially speaking.   This cases were proven in SolarWinds and Colonial Pipeline which important websites, These means that Internal Auditors are expected to be capable of secure and protect data which means internal auditors have to broaden their scope with other departments in order to acquire skills to pay attention in detecting risks that may past prevent controls.   The aim of this paper is to show how information could be easily put in on risk that people have to acquire knowledge to detect them.         Reference:   Hepworth, L.R. et al. (2022) Cybersecurity and Data Privacy: The Rising Expectations Within Internal Audit, Volume 14(Issue 3), pp. 454–465.    

Models & Methodologies

  Process Methodology for Cybersecurity A research methodology explains and discuss data or information collected that is used on the research is a key part for any thesis or presentation (Scribbr, 2019), therefore a Process Methodology is used to understand the previous process to accomplish tasks in Cybersecurity, will be shown on the chart below the series of steps to follow in a specific order.  (Source: Softwaretestinghelp, 2023) To have an effective manage of security there are six steps to follow, these should be follow for an specific team responsible for incidents. The followint steps are:    Preparation: Important part that is responsible to provide valid information to the CSIRT (Computer Security Incident Response Team) this step is important because it help to figure out assets which become critical security attention for the team.   Detection: Second stage is more crucial than the first one because the team should be able to look for any breach or potential threat, onc

Major Project Theme

CYBERSECURITY The cybersecurity is the practice of protect your intelligent systems, networks and software from cyberthreads, which their main focus is to modified or get acces to your personal data that can be really dangerous if you contain fragile information like bank accounts, in our modern world there are so many diffetent types of malwares now, from the ones that are really easy to detect to the difficult ones, that is why on this cybersecurity project we will disccuss about how to deal with these threads and what type of threads are the most common. (Source: depositphotos) What it is a Malware? In terms of speaking a malware is a malicious software desing to hurt or exploit, in these cases bad people with bad intentions spread these softwares to steal data that can be used for blackmail someone for the porpuse to obtain money, the amount of information they can steal is endless from personal information, emails, photos or passwords. Which are the most common Malwares? Adware It

Initial Project Plan (Grantt Chart)

This is the full view of Grantt Chart which basically is  "commonly used in project management, is one of the most popular and useful ways of showing activities (tasks or events) displayed against time. On the left of the chart is a list of the activities and along the top is a suitable time scale. Each activity is represented by a bar; the position and length of the bar reflects the start date, duration and end date of the activity" (Gantt, 2023).   References: (No date) Gantt.com. Available at: https://www.gantt.com/ (Accessed: 03 June 2023).

Essay (Conclusion & References)

 

Essay (Main Body)

 

Essay (Introduction)

 

Computer Ethics In Cybersecurity

    2) Thou shalt not interfere with other people's computer work:  Computer  viruses  are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical. 4) Thou shalt not use a computer to steal:   Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 7) Thou shalt not use other people's computer resources without authorisation or proper compensation:   Multiuser systems use  user id’s  and  passwords  to enforce their memory and time allocations, and to safeguard information.  You should not try to bypass this authorisation system.  Hacking  a system to break and bypass the authorisation is unethical. (Computer skills and Research Lesson, DMUIC, 2023) (Source: https://all