Presentation_NEERO_2025

Attack Targets

One more post for network security students: The internet is a complex construction of devices and connections that spans the globe. It can be difficult to conceptualize every aspect of the internet to use it securely. By understanding how black hats find targets and how they create attacks against those targets, the cybersecurity defenses we Read More

Presentation_NEERO_2025

Elevator Pitch: Is removing explicit personal factors enough to prevent AI bias?

No. Even if explicit personal factors like gender, race, or sexual orientation are removed, AI algorithms can still learn to discriminate based on other variables correlated with these factors. For instance, an algorithm trained on historical hiring data might learn to favor certain keywords or experiences more commonly found on resumes of a particular group, Read More

Presentation_NEERO_2025

Cloud Security

Another post for network security students. Cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this digital transformation introduces unique security challenges that must be addressed to protect sensitive data. This blog post will explore the critical aspects of cloud security, providing insights into potential threats, security measures, and best Read More

Presentation_NEERO_2025

Zero Sum Games and Non Zero Sum Games

Zero-sum games occur when a solution to a problem benefits one group while harming another, resulting in winners and losers. Many scholars in the field of wicked problem solving advise planners to aim for non-zero-sum solutions, where all individuals or populations perceive the solutions as advantageous. In non-zero-sum solutions, the benefits may not be equal Read More

Presentation_NEERO_2025

Elevator Pitch: Necessity and Invention

David Nye argues that the adage “necessity is the mother of invention” is often the opposite of what is observed. He suggests that humans don’t just invent technologies to meet existing needs; instead, they often redefine what is necessary through their inventions. In essence, technology creates new needs and desires, rather than simply fulfilling pre-existing Read More

Presentation_NEERO_2025

Five Layers of Educational Technology

Educational technology in schools is often perceived as a single entity, a collection of devices, software, and online platforms. However, beneath this surface simplicity lies a complex, multi-layered system. Effective integration of technology into teaching and learning requires IT leaders to recognize the characteristics of each. Decision-makers, including educators, IT professionals, and school leaders make Read More

Presentation_NEERO_2025

Descriptive Statistics

Here is a post for data analytics students. Data analysis can feel like navigating a vast ocean of numbers, but descriptive statistics are the compass and map that help us understand our data. These are fundamental tools that allow us to summarize and present data in a meaningful way without drawing any conclusions about a Read More

Presentation_NEERO_2025

Network Hardening

A post for network security students here for all to see. In today’s interconnected world, networks are the lifelines of businesses and organizations. However, they also serve as prime targets for cyberattacks. Network hardening is a critical process that involves implementing a variety of security measures to reduce vulnerabilities and enhance overall resilience. It’s about Read More

Presentation_NEERO_2025

Ransomware: Understanding the Threat and How to Defend Against It

Another post for network security students. Ransomware is a type of malicious software that holds a computer system hostage by encrypting its files. After encryption, the ransomware typically demands payment, often in cryptocurrency, in exchange for the decryption key. This form of cyberattack can cripple individuals, businesses, and even critical infrastructure, making it a significant Read More

Presentation_NEERO_2025

Data Privacy

Yet one more for network security students. In today’s hyper-connected world, data privacy has emerged as a critical concern for individuals and organizations alike. The amount of personal data collected, stored, and used has grown exponentially, raising questions about who has access to this information, how it’s being used, and what rights individuals have over Read More