All posts by Peyton Rohan

About Peyton Rohan

I graduated from Eastland High School in the year 2020. Throughout High School, I have always been on the A honor roll. Throughout High School, I played a variety of sports such as basketball, football, golf, and track. My greatest interest was watching and playing basketball. I started my attendances at Fort Hays State University during the fall of 2020 and have been on the Dean's Honor Roll for the past two semesters. I now plan on graduating from Fort Hays State University during the year 2023 with a Bachelor of Computer Networking and Telecommunications degree that mainly focuses on Cybersecurity. I would say throughout the years of my education is that I am a persistent and hard worker, who gets assignments and projects done.

Cyber-Attack Proposal Summary

The following research proposal investigates the vulnerabilities that make small businesses susceptible to cyber-attacks. This proposed research will take suggestions and evaluate other previous similar research to make the study’s performance high quality. One hundred small businesses with under one hundred employees will be randomly selected to take the designed questionnaire about certain aspects of … Continue reading Cyber-Attack Proposal Summary

Cyber-Attack Layout

  Flow Chart: To start the flow chart, 100 randomly selected businesses with under 100 employees from the United States and Europe. 50 businesses will be from Europe, and the other 50 will be from the United States. After gathering the sample size for the study, managers and employees involved with the businesses’ technology will … Continue reading Cyber-Attack Layout

Reaching Saturation on Cyber-Attacks

The search topic for the proposed research involves cyber-attacks on small businesses and why they are susceptible to these attacks. Bibliography Thesis: The research aims to identify what makes small businesses susceptible to cyber-attacks. Cyber-attacks are becoming a prominent way to steal online information and infiltrate businesses networks. The proposed research will identify the common … Continue reading Reaching Saturation on Cyber-Attacks

Comparing the Proposal and JARS Format

The following presentation explains the differences between the Proposals Instructions and the Journal Article Reporting Standards format.  The links below are the research proposal link and the Journal Article Reporting Standards flow chart, as shown in the video. JARS-Quant Decision Flowchart (apa.org) Informatics Applied Research Proposal.pdf – Google Drive

In-Depth Investigation on Cyber-Attacks

I have a variety of sources that I will be using for my research proposal. My proposal is about cyber-attacks on small businesses. The sources I will be using have a number of areas covered in cyber-security, including Network Penetration Testing, Vulnerability assessments, perspectives of small business owners on cyber-attacks, and ransomware. Searching and Applying … Continue reading In-Depth Investigation on Cyber-Attacks

Diving Deeper into Cyber-Attacks

Search 1: Database: Computer Source Boolean Terms: Breach or Scanning Tools Results: Using the Boolean search term led to 159 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents. Usefulness: The search generated numerous articles, though what I was trying to find was an article involving Network Penetration testing. … Continue reading Diving Deeper into Cyber-Attacks

Quest for Cyberattack Articles

My topic covers cyber-attacks on businesses. Database: Computer Source Keyword: Cyberattacks. Results: 376 articles. Potential Article: O’Flaherty, K. (2021, January 8). The nation state threat to business. ComputerWeekly.Com. https://www.computerweekly.com/feature/The-nation-state-threat-to-business Keyword: Cyber Terrorism. Results: 2, 028 articles. Potential Article: GROSSE, E., SCHNEIDER, F. B., & MILLETT, L. L. (2021). Implementing Insider Defenses: How to avoid insider … Continue reading Quest for Cyberattack Articles