All posts by Nick Gaylord

About Nick Gaylord

My name is Nicholas but I go by Nick. I am currently pursuing a bachelors in networking and telecommunications. I was born and raised in Wichita, Kansas where I currently live. My hobbies include videos games as well as watching and playing football and basketball.

Phishing Attacks Flow Chart and Outline

  Hypothesis: Educating individuals on the dangers of phishing and other cyber attacks can diminish the impact these attacks have on businesses Proposal Outline Introduction Young, R., Zhang, L., & Prybutok, V. (2007). Hacking into the Minds of Hackers. Information Systems Management, 24(4), 281–287. How attackers are using targeted spear phishing to evade cybersecurity defenses’. (2021, November 30). PC … Continue reading Phishing Attacks Flow Chart and Outline

Saturation on Phishing and Other Cyber Attacks

The search topic for the proposed research was explaining cyber attacks such as phishing and good methods to educate and prevent these attacks. It is important for me to find articles that explain what phishing is as well as what other types of attacks are out there. It is also important that I find article … Continue reading Saturation on Phishing and Other Cyber Attacks

Citation and Subject Search for Cyber Attacks

My research topic is about different cyber attacks such as phishing and to prevent and protect against those attacks. I will explain what different kinds of attacks have been used by attackers and how they evolved over time. For the most part, the searches made finding a useful article hard to come by but there … Continue reading Citation and Subject Search for Cyber Attacks

Advanced Search for Cyber Attacks

  Database:  Computer Source Boolean Terms: Ransomware AND Cyberterrorism Results: 73 Potential Article: GEIER, E. (2014). Rescue your PC from ransomware. PCWorld, 32(3), 37–40. Subject Terms: COMPUTER security, MALWARE, CYBERTERRORISM, COUNTERTERRORISM, ANTI-malware, ANTIVIRUS software, COMPUTER viruses Annotation: This article discusses different ways to clear your PC of ransomware such as CryptoLocker and lock-screen viruses. If it may already be too late … Continue reading Advanced Search for Cyber Attacks

Simple Searches of Phishing and Malware Prevention

Database: Computer Science Collection Keyword: Phishing Results: 5,500 Potential Article:  How attackers are using targeted spear phishing to evade cybersecurity defenses’. (2021, November 30). PC Quest, NA. https://link.gale.com/apps/doc/A686594842/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=415026b0 Annotation: In this article, there is an explanation of spear phishing and the different ways you can see them appear. They explain the phishing has evolved from a simple URL to click … Continue reading Simple Searches of Phishing and Malware Prevention

Plan to Research Phishing and Other Cyber Security Attacks

My initial research idea was about cyber security as a whole but no I have changed that to focus more on the certain attacks that can happen such as phishing and malware. I changed this because during our review an article assignment I was really interested in how many people are actually aware of these … Continue reading Plan to Research Phishing and Other Cyber Security Attacks

Improving Cybersecurity Awareness Using Phishing

Provide the citation and attach a pdf of the article. Chatchalermpun, S., & Daengsi, T. (2021). Improving cybersecurity awareness using phishing attack simulation. IOP Conference Series. Materials Science and Engineering, 1088(1), 12015.    PDF 2. What is the abstract of the article?  This paper aims to present a case study of the cybersecurity awareness level of the … Continue reading Improving Cybersecurity Awareness Using Phishing