Don't wanna be here? Send us removal request.
Text
CEID100: Nova Cybersecurity Lab
This week, I played in the Nova Cybersecurity Lab Game, where I took on the role of the Chief Technology Officer of SnapCat, a social media company. My role was to protect the company against cyberattacks by completing different challenges. The game focuses on three key areas of cybersecurity: coding, password security, and social engineering. After successfully defending against multiple threats, I achieved the highest rank, Electronic Emperor, with 54 stars.
The Ongoing Battle Between Cybersecurity and Cybercrime The coding challenge showed me basic programming skills by having me control a robot through a maze with dragging and dropping commands. It taught me the importance of creating secure code to prevent hackers from accessing weaknesses. In this week's module, I learned that cybersecurity and cybercrime are always growing, which means that software needs to be updated regularly to keep secure.
Password Security and Cyber Laws In the password-cracking challenge, I had to create secure passwords while at the same time testing how quickly weak ones could be cracked. This is related to our conversations about the significance of strong passwords and multi-factor authentication. Companies have to follow data protection laws to make sure that user information is protected.
Social Engineering and Intellectual Property Protection The social engineering challenge looked at my abilities to identify fake emails, websites, and phone calls. This is related to phishing scams and online fraud, which we covered in this week's module. It's also related to the concept of contested data, in which hackers attempt to steal intellectual property like copyrighted content or trade secrets.
The game included real-world cyberattack stories and short movies that explained hacking, encryption, and internet privacy. Playing the Nova Cybersecurity Lab taught me that cybersecurity is an ongoing struggle and that securing data involves both technical skills and knowledge of social engineering techniques. This game made cybersecurity feel more real and practical, and I now understand why it is so important to keep software up to date, use strong passwords, and recognize scams in today's digital world.
0 notes
Text
Module 6 Assignment
https://drive.google.com/file/d/12aZMW7tmIS5O-770FDjCI6QIUg_zcLb6/view?usp=drivesdk
0 notes
Text
Disinformation - Reddit post on Online Manipulation
According to research, false information networks have targeted specific Reddit groups with the goal of increasing frustration and conflict. For example, users have noticed an increase in misleading posts intended to spark debate and spread disinformation. Attentive readers can recognize such disinformation by examining the intent behind posts, confirming material from many credible sources, and being suspicious of content that appears to be intended to cause strong emotional reactions without any basis in fact.
Misinformation - Reddit post on Medical Falsehoods
In a recent post titled "Medical misinformation causing Canadians harm: CMA" on reddit the author notes concerns voiced by the Canadian Medical Association about the impact of medical misinformation on public health. The article demonstrates how misinformation can spread in internet groups, often without selfish intent. Attentive readers can spot such misinformation by reviewing the accuracy of sources, cross-referencing claims with reliable material, and being careful of extreme story lines without proof.
Malinformation - Redditpost on Racism against Indians
In a thread on reddit headlined "Misinformation and racism against Indians," people discuss a misinformation campaign accusing Indians of bad behavior on Canadian beaches, particularly Wasaga Beach. This case demonstrates malinformation, which occurs when genuine information is spread in a misleading context in order create hatred and ruin a community's reputation. Attentive readers can recognize malinformation by carefully examining the reason and motive behind the spread of factual information, determining if it serves the public interest or seeks to wrongfully harm persons or groups.
0 notes
Text
Tutorial Assignment 4 - Group Project Proposal
0 notes
Text
The site with the most number of trackers was Amazon. I counted around 47 trackers.
What I noticed when looking at the number of trackers for each site, one site that also had a lot of trackers is CP24. They had around 31 trackers.
eBay the other e-commerce site i checked didn't have as much trackers as amazon or CP24 but did have a decent number.
I noticed the other news site BBC didn't have as much trackers compared to CP24. There is a very big difference comparing those two news sites.
The rest of the sites had a decent number of trackers but nothing compared to Amazon.
The government sites and social media sites had the least amount of trackers comparing to all the others sites i've looked at.
0 notes
Text
0 notes
Text
This social media post efficiently uses best practices to engage visitors and promote the product. Kirkland Chicken Breast Chunks stand out due to their vividly coloured packaging and well-organized display. The overlay language, "Chick-fil-A Dupe," encourages users by citing a well-known restaurant chain, appealing to people looking for a convenient, cost-effective option. The reviewer's caption, which states that they "found this trending" item, provides a sense of discovery and relatability, appealing to the audience's curiosity about hidden gems. The informal and conversational tone conveys a warm vibe, similar to a recommendation from a trusted friend. The post increases confidence and credibility by linking the product with Costco, a well-known and trusted brand. The combination of eye-catching pictures and simple language guarantees that the message is instantly understood, which is ideal for fast-scrolling social media users. Also, the post quietly encourages involvement by urging readers to sample the product and share what they think, which promotes conversation. Using Goffman's dramaturgical idea of backstage self-presentation, the reviewer assumes a calm and friendly appearance, resulting in authenticity and connection. This relaxed, personal tone builds audience trust and invites conversation, making the content highly effective in generating interest and engagement.
A certified medical aesthetician shared a social media post showcasing economical makeup items at Walmart for budget-conscious viewers, including Maybelline Fit Me Foundation and e.l.f. The post's legitimacy is built by emphasizing the aesthetician's professional credentials, while the conversational tone, which begins with "Okay, so a lot of people ask me," fosters a personal connection. The post's organized structure of products guarantees that readers leave with practical recommendations, encouraging them to try the items for themselves. The reality of the scene within Walmart adds to the post's credibility. This mix of experience, affordability, and a conversational tone aligns well with Goffman's concept of backstage self-presentation, in which the designer presents a friendly, qualified image. Relevant, credible material informs and encourages audience interaction and engagement.
The Costco post has a casual, open tone, which builds credibility and connection with the viewer. It focuses on an appealing and affordable product that promotes connection and engagement. The Walmart post focuses on the frontstage self, highlighting their professional identity as a certified medical esthetician. This increases authority and establishes the creator as a credible expert. Both posts effectively balance frontstage (selected expertise) and backstage (casual relatability), putting Goffman's theory into action.
1 note
·
View note