All posts by djparks

Cybersecurity in Infrastructure Research Proposal

Link to Final Research Proposal: https://docs.google.com/document/d/1suEQ6Po58HbgpmABuZG-aJViFSdZ-1w-/edit?usp=sharing&ouid=106053748700277601726&rtpof=true&sd=true It was fun thinking about how to approach asking the questions I’ve been wondering about for quite a while now. I realize after taking this class that conducting a study in a way that is valid and respected takes waaaaaaay more work than I ever would have guessed. My … Continue reading Cybersecurity in Infrastructure Research Proposal

Finalizing Search Techniques

Search Topic – Cyber Security/Cyber-attacks on Infrastructure Database – EBSCOhost, “Computer Source” 1st Search – “Cyber-attack,” 902 results Results are somewhat useful, but they are a little too broad. More terms are needed. 2nd Search – “Infrastructure Security,” 970 results Great results here. I was thinking “security” was too generalized but in general articles are … Continue reading Finalizing Search Techniques

Rapidly Refining Research — Wk11

Source 1 Database: “EBSCOhost, Computer Source” Search: “Vulnerability AND Security AND Cyber Attack.” There were no other filters applied. Results: 122 Article selected: “Computer Security Vulnerability as Concerns the Electricity Distribution Grid” by Stosovic, Dimitrijevic, and Litovski. Subject terms: computer security, electric power distribution, cyberterrorism, malware, eavesdropping, artificial intelligence. Stošović, M. A., Dimitrijević, M., & … Continue reading Rapidly Refining Research — Wk11

Diving Deeper into Databases — Cybersecurity Studies

Database 1: https://web-s-ebscohost-com.ezproxy.fhsu.edu/ehost/resultsadvanced?vid=2&sid=2a1a2735-5522-47b7-88e9-3ceb945aa3b4%40redis&bquery=security&bdata=JmRiPWNwaCZ0eXBlPTEmc2VhcmNoTW9kZT1TdGFuZGFyZCZzaXRlPWVob3N0LWxpdmUmc2NvcGU9c2l0ZQ%3d%3d Database 2: https://go-gale-com.ezproxy.fhsu.edu/ps/start.do?     p=CDB&u=klnb_fhsuniv   Keywords: Cybersecurity, Networking, Computer Database 1, Cybersecurity – 3,252 Results Database 1, Networking – 22,123 Results Database 1, Computer – 677,740 Results Database 2, Cybersecurity – 200,000+ Database 2, Networking – 1,000,000+ Database 2, Computer – 2,000,000+   Results were mixed. Way too many results and … Continue reading Diving Deeper into Databases — Cybersecurity Studies

Cyber Attack Study

Article Summary Citation and Link Alghamdi, W., & Schukat, M. (2020, July 24). Cyber Attacks on Precision Time Protocol Networks—A Case Study. mdpi.com. Retrieved February 28, 2022, from https://www.mdpi.com/2079-9292/9/9/1398 Link to the article- https://fhsu.userservices.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=18831849820001141&institutionId=1141&customerId=1130 Abstract The IEEE 1588 precision time protocol (PTP) is used by many time-sensitive applications and systems, as it achieves sub-microsecond time … Continue reading Cyber Attack Study

Cybersecurity Jobs – ESU, AWS, NFL, CompTIA

Potential Employers – Daniel Parks   Emporia State University Contact Information 1 Kellogg Cir, Emporia, KS, 66801 https://www.emporia.edu/ 620-341-5465 Contact: Cole Kelley Company Overview Emporia State University is the highlight of Emporia. It is the only institution in the area that offers an Bachelor’s Degree or better. There are others in Topeka, Wichita, etc., but … Continue reading Cybersecurity Jobs – ESU, AWS, NFL, CompTIA

Diffusion of Innovation: Foldable Phones and Electric Cars

The innovation I’ve decided to talk about is folding screens on phones. I would consider myself in the 5th and final stage of the adoption process. I remember hearing about the Galaxy Fold a few years ago and thinking that it looked very cool, but I never thought I’d buy one because they were $2000. … Continue reading Diffusion of Innovation: Foldable Phones and Electric Cars