Posts

Evaluation

Image
EVALUATION   The Gantt chart is shows the project schedule or structure  we made it to monitor our progress  It helped because it served as a To-Do-List  1) Oxford book on cyberpsychology                   DMU book review on the emerging trends and recent developments in cyber security  3) A you tube videos explaining the advancement of cyber attacks over the years                                                                                                                                          ...

Primary research

Image
                                 Primary Research    I created a google form containing questions from my research and got answers from my classmates and friends the google form consisted of 10 questions and i got satisfactory answers most likely because almost all my friends are IT inclined. conclusion : I am happy people have a little knowledge on this topic and i hope my blog will be able to create more awareness. Reference: Smith, J. (2020) Understanding Cyber Attacks . 2nd ed. Oxford: Oxford University Press. 

secondary research

                                                                              Secondary Research  Academic research plays a vital role in advancing our understanding of cybercrime, it also aids in the development of effective reduction strategies. Graduates across various fields of studies including cyber security and computer science have contributed to the fight against cybercriminal activity. Academic institutions such as university of Cambridge and The university of south wales collaborate with research organizations and government agencies to conduct studies and develop software's to aid cyber defence WHAT IS CASE STUDY RESEARCH METHOND ?   Case study in research is a detailed and in-depth research of a specific subject common key terms related to cyber crimes include:   - ...

Second post

Image
cyber attack WELCOME TO MY SECOND POST  Cyber crime is an evolving threat in field of technology with a wide range of improper activities being conducted through the internet from financial fraud to identity theft and ransomware attacks these activities require an in depth knowledge of computers and how they operate in other words they are done by experienced individuals who exploit vulnerabilities in computer systems and networks for personal gain or for intent to cause damage. Cyber crime is vast, with perpetrator's ranging from organized criminal groups to payed individuals hired by organizations and the highly influential individuals in society. According to the FBI's Internet Crime Complaint Centre (IC3), cybercrime complaints have been on the rise in recent years, highlighting the escalating threat landscape. Understanding the motivation behind cybercrime is is a step towards developing a solution. 1) financial gain: Financial gain is the main reason for most cyber crime...

Welcome post

Image
INTRODUCTION Welcome to my blog my name is Chibuikem Anthony Anele - Ukeje from Nigeria . I am a student of DMU international college,my hobbies are watching moves, listening to music and playing video games i am a very simple man. A current issue in IT   A current issue that inspires me in IT is cyber attacks According to the UK government as published in April 2024 there have been 7.78 million cases of cyber crime in the last 12 months which cost companies billions of dollars each year . A cyber crime is simply the use of a company or any device on a network to involve in criminal activity.                                                                    HACKER References   Smith, J. (2020) Understanding Cyber Attacks . Oxford: Oxford University Press.        Singer, P.W. and ...