It's a subject that requires logic, knowledge, thought and commitment
Senior at Mizzou, Josh has an emphasis in cybersecurity while also working at InfiniTech as a Microsoft 365 and Endpoint Engineer.
Having an emphasis in software engineering and pursuing a career in front end/react dev, Luke continues his senior year Mizzou.
Located in Chicago, Seun is a senior at Mizzou. Post graduation, he is looking into software engineering.
Still unknown for future career, Dylan continues to work hard in his software engineering and cybersecurity classes to apply later in the workplace. Best drink to his opinion, Sprite.
Senior at Mizzou, Shelby is pursuing a career as a tech arch delivery analyst. Her degree emphasis is in software engineer. An enjoyable show of hers is Code Geass when not submitting homework.
The more users we secure, the more secure we all are.
Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. The strength of a password is a function of length, complexity, and unpredictability. Using strong passwords lowers overall risk of a security breach and the effectiveness of a password of a given strength is strongly determined by the design and implementation of the factors (knowledge, ownership, inherence).
Check the strength of your passwords here
To know whether a file is safe or no can be very tricky.
If you are not careful, you might end up ruining your computer when downloading.
The internet has many websites that claim they have the correct file. Most of the time,
you have to open the file to confirm the file is safe. And by that time, it may be too late
to protect your PC from malware and virus programs.
You can learn more about file Identification and the types out there here
An unsecure wireless connection is one you can access without a password. Public networks offered in places like cafes are often open. Although these provide free wireless Internet access, using public Internet comes with dangers. If your home Internet is open, you should consider securing wireless access to protect your data and avoid legal trouble.
Know if your network is public or private here
Phishing is where a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Go through phishing simulation here
To build a website where users may learn and interact through a series of cybersecurity related activities. The website will be a place where users can heighten their posture of cybersecurity awareness and learn how to protect themselves where making a mistake is seen as a positive reinforcement.