All posts by Kayla Mickey

About Kayla Mickey

Hi! My name is Kayla. I am 25 years old, and I live in PA. I work full time at a cable/internet/phone company as a social media specialist. I currently have an Associates degree in Specialized Technology as a Computer Tech. I am going for my Bachlors degree in Telecommunications and Networking.

Cyber Security Proposal

This paper offers some insight on what Cyber Security is, how it can be prevented and some thoughts on hackers within. It will give some knowledge that most people do not know. How to keep an eye out for hackers and some interesting findings I have found within my research. Some key words included in … Continue reading Cyber Security Proposal

Cyber Security Flow Chart and Outline

    Hypothesis: Educating more on viruses and the danger of hacker threats.  Proposal Outline Introduction (heading not included) Firms turn to AI to fight cyber attackers,  Goodwin, B. (2019) What We Talk about When We Talk about “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. Computer & Internet Lawyer, 34(3), 1–8. Miller, K. L. (2017).  … Continue reading Cyber Security Flow Chart and Outline

Final Searches

I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe.   1st Search Database: Academic Search Premier Search: Cyber security AND prevention and control Limiters: Full text, Peer reviewed  Results: 25 Crespo, M. (2020). let’s collaborate! cyber security. Technology … Continue reading Final Searches

Diving Deep into Cyber Research

Citation: I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe.   Frank, M. L., Grenier, J. H., & Pyzoha, J. S. (2019). How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal … Continue reading Diving Deep into Cyber Research

Refining The Best Options

Search 1:  Database Used: Academic Search Premier Boolean Term: Cybersecurity and Hackers Limiters: Full text & Published after 2010 Search Results: 115 Subject Terms from Interesting Study: COMPUTER password security, INTERNET security, KEYSTROKE timing authentication, COMPUTER security, JUST-in-time systems Potential article: Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving … Continue reading Refining The Best Options

Cyber Security-Information to Protect You

Database: Computer Source Keyword: cyber security Results: 4,498 Potential Article: Public–private partnerships in national cyber-security strategies CARR, M. (2016). Public–private partnerships in national cyber-security strategies. International Affairs (London), 92(1), 43-62. https://primotcna01.hosted.exlibrisgroup.com/permalink/f/t8k1f3/TN_cdi_proquest_journals_1755401695 Database: Computer Source (EBSCOhost) Keyword: cyber security prevention Results: 11 Potential Goodwin, B. (2019). Firms turn to AI to fight cyber attackers. Computer Weekly, … Continue reading Cyber Security-Information to Protect You