Another post on network security for my students. Security threats are constantly evolving, and it is important to be aware of the different types of threats, how they work, and how to protect against them. Cyberattacks are becoming more frequent and sophisticated, and they target everything from large cloud computing servers to small Internet of Read More
Author: Gary Ackerman
Social Engineering
A post on social engineering for my network security students. Social engineering is a type of attack that relies on manipulating individuals to gain access to information or systems. It does not depend on exploiting technology vulnerabilities. Instead, it targets human weaknesses to persuade victims to take actions or give up information. Social engineering can Read More
Elevator Pitch: Resistance to Change
Resistance often stems from a lack of clarity about goals and actions within the plans. Leaders that dismiss those who disagree with them risk failure. Addressing resistance through clarifying goals and actions with respect to the intended actions, leaders can reduce resistance and improve their success in affecting change.
Interaction in Online Classrooms
There are many models of having students interact in online classrooms. Each has its own unique characteristics and purposes These models include: Discussion Boards: These are the most common tools for online interaction, primarily using text. Students create “posts” and respond to others’ posts, creating a “thread” of discussion. While discussion boards can be a Read More
Theory and Practice in Education
46: Bridging the Gap: Educational Theory and Practice Education is one of several soft technologies that share an interesting trait: The scholars who discover the science behind the natural phenomena that are the basis of the technology and the practitioners who apply that science to the human purpose are different people. Other examples of human Read More
Wireless Network Security
Another post for my network security students, but you can read it too 🙂 Wireless technology has become an integral part of our daily lives, both personally and professionally. From smartphones and laptops to tablets and IoT devices, wireless networks provide the convenience of accessing information, communicating, and controlling devices without the constraints of physical Read More
AI in Education
AI has the potential to make education more accessible and equitable. Here’s how: However, there are concerns about data collection, privacy, and transparency, as well as potential bias in AI decision-making. It’s important to address these concerns to ensure that AI is used to promote equity and not exacerbate existing inequalities.
Concerns About AI in Education
A brief post for upcoming presentations. There are several concerns regarding the use of AI in education, particularly related to data privacy, potential for bias, and the need for careful implementation. Data Privacy and Transparency: The collection of student data, including personal and biological information, raises concerns about privacy and security. For example, the use Read More
Unlocking the Secrets: A Deep Dive into Cryptography
In an increasingly interconnected world, the need to protect sensitive information from unauthorized access has never been more critical. This is where cryptography comes into play. Far from being a niche concept, cryptography is a fundamental building block of modern security, underpinning everything from online banking to secure communication. This post will explore what cryptography Read More
Thinking About Science and Popper
Karl Popper has significantly influenced how people think about science by emphasizing the importance of falsifiability as a way to distinguish between genuine science and pseudoscience. Popper argued that a good scientific theory should be bold in its claims and open to being disproven by observational evidence. According to Popper, scientists should actively seek to Read More