Home > Year 2 Artifacts and reflections
This is a reflection on Information Operations in A Connected world assignment. I did this assignment in Spring 2021 of my second year at Tiffin University.
- Other than the requirement and importance of this assignment of this class, I spent time on this artifact because I did not know much about China. I Always knew that china was one of the best countries in the world in the cyber security field, but I had no Idea that China could do all the crimes that I learned about them.
- The process that I did to do this artifact was to start with studying China capabilities in the cyber security field. It was extremely interesting what china could do to get the information that they need. China will do espionage crimes to get a political information about the targeted country. In this artifact I worked with a classmate as a group in CDS445
- This artifact took me a week and 3 days to get it done. Me and my partner in the group gathered enough information to do this presentation. We did not do revisions. Most the work was well put and very organized. We did not need to do a revision.
- This artifact has taught me much information about china. It made me realize what they can do to gain a piece of information. I learned that for the benefit of their economic they will cross all the red lines and maybe destroy someone life for either the benefit of growth of China’s economic or military advantage.
- I believe this artifact has no weakness. We overly made a perfect outcome of this assignment. The strengths were the large pile of information we gathered to make it look perfect.
- I am sure that this artifact will be very useful in the future. Now I know what china is capable of and what they would do for the Chinese growth.
- If I was going to complete this artifacts again I’d add more information of china unethical hacking.
This is a reflection on Cyber Security Challenges and its Emergence in Latest Technologies assignment. I did this assignment in Spring 2021 of my second year at Tiffin University.
- I enjoyed spending time creating this artifact. In this artifact I covered various of information about the latest technology in the cyber security field. It showed me and taught me many things about the cybercrimes and the kind of techniques hackers do to get to the IT systems of a company or a server.
- I worked in this artifact alone. In this artifact I did a questionnaire in TU to gain information from students to see how well their phones or laptops are secured. In my questionnaire it included 10 questions about security. I posted the questionnaire on Moodle and send to some of my friends in TU to answer the 18th questions. I followed my professor instructions to make this questionnaire. It was a fun assignment to do.
- This artifact took about 4 weeks to have it done. At the beginning I did my questionnaire by creating 10 questions. Then I shared it with TU students and my classmates. Then I started writing the artifact and from the gathered information from the classmates.
- This artifact supports my growth because the things that I did that I never done before. I never done a questionnaire before doing this artifact. For me, it was enjoyable experience to be able to do this kind of artifact, where you write questions for your classmates and your university and based on their result you write your artifact.
- I’d say this artifact has no weakness in my opinion. Although, it has a lot of strengths. In this artifact, there are tables showing the questionnaire work and by reading you can see people answers for security questions and how well they secure their accounts. another strength this artifact has is the variety of information.
- This artifact will be useful in the future. I have learned many things from this artifact. As I was writing it, I’ve woken up from many things that can damage my private information. Like making my social media account visible for everyone or sharing to much information in it.
- If you were going to complete the artifact or activity again, what would you do differently? If I was going to make this artifact again, I’d make it a little bit more organized and make the points clear for the reader.
This is a reflection on Leadership Essay assignment. I did this assignment in Spring 2021 of my second year at Tiffin University.
- Other than the requirement of the class to do this artifact, this assignment was important to me. I admired this artifact because I was talking about my father and how his leadership has taught me so many useful life lessons. Since I was a kid, my father was first teacher and guidance. His job never was an issue although he used to work in national guard of Saudi Arabia. From time to time, he would travel with his force but still stay in contact with us. This experience had taught me how to never forget about your family no matter what kind of mission or job you work on.
- For this artifact, the process was kind of simple. The first step I took to do this artifact was just remember the lessons he taught me on how to manage to always find solutions for your issues when you’re in trouble. His lessons were not to trouble yourself in the first place but in case you did. Always take a deep breath and try to find solutions.
- This artifact did not take long to finish it. I believe a day and half. I could’ve finished in less time than that, but I had different assignments in that week which made take tow days to have it ready to be submitted.
- I learned from creating this artifact that leadership skills are more to be in a person if that person was taught well or was guided well. I believe that leadership skills are something that not everyone has but could have if someone has taught them the leadership skills. This artifact supports my claims of growth by learning the leadership skills from my father and in the class and its assignments of how to be successful leader.
- I believe there are no weaknesses in this artifact. The strengths are the leadership capabilities.
- I am sure that This artifact will be useful in the future. It will be useful because leadership capabilities are something very important for me keep learning. I believe and hope that one day to be a father to 3 boys and a daughter, and I need to be a good leader to have the ability to teach them good lessons like how my father taught me.
- If I was to complete this artifact again, I’d add some more lessons of my father and maybe add some points about how to be a good leader.
This is a reflection High Profile Hacking Incidents in China. I did this assignment in Spring 2021 of my second year at Tiffin University.
- It was very interesting make this artifact about the high-profile incidents in China. I spent time doing this artifact because china cybercrimes are overly complicated and has too many information to follow up to.
- The process that I follow to do this assignment was to start by gathering data about the high-profile incidents in china. I chose this topic in, because my instructor professor Scott blugh was talking about it earlier that week. I was also assigned to write about China. In this assignment I was working alone.
- I took almost 12 hours of working on this artifact. We didn’t spend much time on it, but I’m sure we made a good artifact. No revisions were done on this assignment.
- In this artifact I have learned that countries nowadays don’t use guns to attack one another. They start hacking servers and getting control of computers causing trouble in the targeted country’s economic growth. No need of starting physical wars anymore when they can hack the selected countries’ servers. This artifact will support my claims of growth by discovering a new malicious malware.
- I believe that the strength of my artifact is in how well each point was backed up with enough information. The weaknesses, I believe I needed a better outline to make this artifact well organized
This is a reflection on Software Piracy assignment. I did this assignment in Spring 2021 of my second year at Tiffin University
- I have spent my time in this artifact because software piracy is a serious problem in my field. software piracy costs software developers and their companies billions of dollars every year. Software piracy is when hackers do the act of copying, distributing, or using proprietary software belonging to someone else who paid money to get it.
- The process I follow to create this artifact was collecting enough information about software piracy. What is software piracy, what is considered to be software piracy and who is affected by this act. I choose this topic because back then I just learned about software piracy and I wanted to learn more about it. I was working in this assignment alone.
- This artifact took me 2 days to gather enough information about the software piracy. It was enough for me to fully understand and to be able to create it and write about it. for the revision I did a type and grammar revision to make sure no mistakes were made.
- As I mentioned this artifact was knew to me back then. This artifact made me understand software piracy and how companies are hurt by it. it cost a large amount of money and they can stop it unless they find a way to distributed.
- I learned from creating this artifact that Governments and organizations such as BSA have been fighting software piracy in the corporate and commercial sectors, and the enforcement has had several successes. However, software piracy is still thriving and has not been defeated despite fines and litigations.
This a reflection on Social Engineering. I did this assignment in Spring 2021 of my second year at Tiffin University.
- Other than the requirement and importance of this assignment of this class, I spent time on this artifact because I did not know much about China. I Always knew that china was one of the best countries in the world in the cyber security field, but I had no Idea that China could do all the crimes that I learned about them.
- The process that I did to do this artifact was to start with studying China capabilities in the cyber security field. It was extremely interesting what china could do to get the information that they need. China will do espionage crimes to get a political information about the targeted country. In this artifact I worked with a classmate as a group in CDS445
- This artifact took me a week and 3 days to get it done. Me and my partner in the group gathered enough information to do this presentation. We did not do revisions. Most the work was well put and very organized. We did not need to do a revision.
- This artifact has taught me much information about china. It made me realize what they can do to gain a piece of information. I learned that for the benefit of their economic they will cross all the red lines and maybe destroy someone life for either the benefit of growth of China’s economic or military advantage.
- I believe this artifact has no weakness. We overly made a perfect outcome of this assignment. The strengths were the large pile of information we gathered to make it look perfect.
- I am sure that this artifact will be very useful in the future. Now I know what china is capable of and what they would do for the Chinese growth.
- If I was going to complete this artifacts again I’d add more information of china unethical hacking.
This is the reflection on Robin Sage assignment. This assignment was done in Spring 2021 of my second year at Tiffin University.
- I did a research on google to gain information about the Robin Sage experiment. It is a very popular experiment, and it was really easy to find information about this great experiment. I did not really choose this topic as it was assigned to me by my instructor in DEC445, Professor Scott blugh.
- I created to this artifact in specific because the experiment of Robin sage was one of the greatest experiments that was done in the Cyber Security field.
- I was doing this research with a classmate of mine in CDS445. We were assigned to work together to complete this assignment and research Robin Sage from every perspective of the case.
- This artifact supports my claims of growth in knowing the techniques of hackers and their methods to lure people in giving them private information without them knowing that they just put their self in the hands of a hacker. I learn that hackers are learning new things every day. They always gain private information by either scaring the target or going soft with as they did in the Robin sage experiment when they acted like a female to gain the targets trust.
- I believe this artifact has so many strengths and not many weaknesses. The strengths are knowing the hackers mind and how they work to gain information, another strength that I learned from this artifact is that most hackers can change their sex depending on the target situation.
- I believe This artifact will be useful in the future because it talks about the psychological techniques that hackers have.
Author:
Sultan Aldawsari
Last modified:
12/5/2021 2:14 PM (EST)