The internet-enabled people to receive information in real-time. The interconnection of systems allowed algorithms to be remotely controlled and to make autonomous decisions. Information warfare (IW) is characterized by the search for destabilization, exploitation, corruption and destruction of information systems controlled by the adversary.
Continue readingCategory: Master Degree- Essays
Security Awareness poster
I love coffee, so I did a security awareness poster connecting the Coffee time and Security tips!
Continue readingClassifications of computer criminals
With the expansion and diversification of cybercrime, strategies have become an obstacle to understanding and categorizing crime agents.
Continue readingControlling cybersecurity issues
Professionals and managers seek daily to identify these elements and take preventive or corrective actions to avoid damage caused by these events.
Continue readingReflections about cybercrime
With the growth of the number of people connected to the internet, cybercrime has become a severe problem globally.
Continue readingWorms and viruses that have disturbed the cyber world from 1970’s to 2000’s
A very short review of the viruses that disrupted the cyberworld since 1970.
Continue reading