All posts by Joshua Okechukwu(he/him)

About Joshua Okechukwu(he/him)

Student athlete at Fort Hays State University, orginally from NIgerian but raised in Washington DC

Research Proposal Outline and Flowchart for Cyber security in Businesses

HYPOTHESIS:  Understanding viruses and the dangers of hacker attacks in enterprises, as well as the importance of data security.   PROPOSAL OUTLINE: Introduction- A brief overview of the present condition of cyber-attacks affecting businesses all around the world. Knowledge about the types of cyber-attacks that are occurring in the commercial world. Discuss the research proposal … Continue reading Research Proposal Outline and Flowchart for Cyber security in Businesses

The Final Search

For my topic I am doing research on how cyber security involves with businesses. How having good security benefits with protecting your business. From data files, information and etc. and just want to expand on how cyber attacks try to breach data. Search 1: Terms-  Data Breach “AND” Data Privacy “OR” security Results- 346 Database- … Continue reading The Final Search

More in Depth to find Sources

Subject Search Database: EBSCOhost Applied Science & Technology Source Ultimate Pandya, Minesh. “Increasing Cyber Attacks Are Causing Disruptions and Delays .” EBSCOhost, 2 Feb. 2022, https://web.p.ebscohost.com/ehost/detail/detail?vid=16&sid=0763e267-60bb-46d5-b43b-d32aba92b465%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=155140737&db=asa. Subject Term: Cyber Attacks on business’ While using the search term “Cyber Attacks on Business’ ” I found about 57 results , but I narrowed that search down by filtering … Continue reading More in Depth to find Sources

Looking more in Depth with Cyber Attacks

Search 1: Database: Computer Source Boolean Terms: Cyber Attacks and Business Results: Using the Boolean search term led to 217 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents. Usefulness: The search yielded a slew of results, but what I was looking for was an article about cyberattacks against … Continue reading Looking more in Depth with Cyber Attacks

Cyber Security Articles

Database- Computer Source keyword- cybersecurity results-   3,237 Potential Article E Silva, K. K. (k.k.esilva@uvt.nl). “Vigilantism and Cooperative Criminal Justice: Is There a Place for Cybersecurity Vigilantes in Cybercrime Fighting?” Mar. 2018, https://web.p.ebscohost.com/ehost/detail/detail?vid=5&sid=b6247cdf-74da-4210-80c4-8485bc1a17df%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=128454595&db=cph. keyword- cybercrime results-  3,512 Potential article Wall*, DavidS. (d.s.wall@leeds.ac.uk). “Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime.” Computer Source, 2008, … Continue reading Cyber Security Articles

WEEK 6 Article- Cyber Security in New Space, Analysis of Threats

https://link.springer.com/content/pdf/10.1007/s10207-020-00503-w.pdf Provide the citation and attach a pdf of the article Manulis, M, et al. “Cyber Security in New Space, Analysis of Threats, Key Enabling Technologies and Challenges.” 12 May 2020, https://link.springer.com/content/pdf/10.1007/s10207-020-00503-w.pdf. What is the abstract of the article? Technological advancements, attitudes, and investment are reshaping the space environment, making it more accessible to a … Continue reading WEEK 6 Article- Cyber Security in New Space, Analysis of Threats