Category: Blogposts

  • Understanding Cyber Laws and Regulations

    April 20th, 2024Author: Annabel Otutu Introduction The advancement of technology and the increasing reliance on digital platforms has created benefits as well as opportunities. This digital revolution has also given rise to challenges, such as cybercrime, data breaches, and online fraud. To address these concerns and ensure a secure digital environment, governments around the world…

  • Deep Fakes

    By Lily Pouliot Date: 04/05/2024 What are Deepfakes? Deepfakes are instances where powerful techniques from machine learning (ML) and artificial intelligence (AI) are leveraged to manipulate or generate visual and audio content with a high potential to deceive.  These artificial images or videos are generated through a process called deep learning. This type of learning…

  • Exploring Cybersecurity Paths

    March 24th, 2024Author: Annabel Otutu Cybersecurity is a field that is often covered in mystery. Often, people don’t know the reach of cybersecurity or where it applies to. Cybersecurity is a part of many modern-day lives; from smart homes to our mobile phones. Nowadays our cars have enough computing power to be considered ‘smart’. What…

  • Understanding The OSI Model

    February 20th, 2024Author: Rune Seregina Concept The Open Systems Interconnection model (OSI model) is a framework to describe the seven (or more) abstraction layers on which communication between devices occurs. These layers, from bottom to top, are as follows:   Each layer serves a specific purpose within a greater systematic approach to networking and network security.…

  • The Tool for the Creative: Steganography

    How Messages are Hidden in Images. Author: Kenneth Moran

  • What Exactly Is A Digital Footprint?

    Nothing can be erased forever. Author: Rune Seregina

  • The Creeper Virus

    I’m the creeper; catch me if you can! Author: Clare McCaffrey

  • Information Gathering and Ethical Hacking

    Ethical Hacking Fundamentals: Exploring Information Gathering Techniques By: Ryan Morrissey and Annabel Otutu

  • Security Information and Event Management (SIEM) Technology

    Tools for Defending Organizations with Advanced Threat Detection and Proactive Security Intelligence. Authors: Ryan Morrissey and Annabel Otutu

  • Know Your Rights: The Fourth Amendment & Digital Devices 

    How does U.S law protect us against illegal searches and seizures of our digital devices?  Author: Alexia Bowie