• White Hat (Reconnaissance)
    May 17 2022
    -Picked an organization and executed a bit of passive reconnaissance on the target. Provided as much data on the organization that is possible from publicly available sources. -Provided an explanation of the reconnaissance techniques that consist of ping sweeping, packet sniffing, port scanning, phishing, social engineering, and provide an example for each. Also, provide recommended defense tactics for each scenario --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    12 mins
  • Answer to Cybersecurity
    Apr 27 2022
    The requirement is to be able to comprehend psychology. One must find out how workers think, but above all one needs to understand how attackers think. Once one has that in their belt, they will have the knowledge to take charge and prevent data leaks and cyberattacks. By comprehending how one thinks and behaves- and why - one can be ready to develop their security position. Some of the questions that need to be considered are: ● What equity needs to be protected and who can obtain it. ● What safety equipment is already in use and how they influence the participation of the users. ● How many times do you interact in cybersecurity classes with people and what do classes have to do with them? ● Figuring out if one works with outside companies to run phishing campaigns or social engineering attacks ● What personal devices are present in the work area such as tablets, smartphones, etc. ● Password guidelines and if workers follow them ● Attitude towards cybersecurity in a business. --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    9 mins
  • Advocacy Report On Eating Disorders
    Mar 31 2022
    There are many eating disorders such as anorexia, bulimia and binge eating, some of the most common. All of them can have serious issues. Eating disorders are classified as illnesses that involve eating habits that are not healthy and fixation with body weight, shape, along with food. Eating disorders have one of the highest loss of life rate of mentally ill disorders. This disorder affects around 10 in 100 teen girls in the United States. Based on the statistics one can really see that eating disorders are very relevant in society and need to be addressed. There are many contributing factors for why a teen girl may develop an eating disorder and the one’s I will discuss are social media, stress, and abuse. The consequences for eating disorders are harmful to teen girl’s health, psychological well being, and relationships. The solutions for these issues are treatment, education, and prevention. --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    30 mins
  • Cybersecurity Investigations
    Mar 21 2022
    1. Explaining the legal challenges faced by an organization during an investigation while pursuing cyber attackers. Framed my answer based on the following points: o Authorization needed to gather evidence o Identifying evidence o Admissible evidence o Evidence handling o Maintaining chain of custody 2. Explaining the working of the International Multilateral Partnership against Cyber Threats organization (IMPACT). How does IMPACT affect what we do in the US and abroad? 3. How does the Wassenaar Arrangement affect information security? 4. If an employee is found guilty of disclosing a company’s confidential data. What national laws are applicable to him? What are the laws applicable to him if this is a case of cross-border disclosure of information? Do I think security awareness trainings would have helped in this case? --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    9 mins
  • Cybersecurity in Organizations
    Mar 7 2022
    cybersecurity, what are the roles and responsibilities of organizations? Policymaking Role of an individual Laws and regulations Security awareness Monitoring Compliance implementing BCM as per ISO 22301. Describe 6 critical processes and include all the necessary fields required by the standard. Emerging and future technologies that organizations have to worry most about from a security perspective? Explained the need for Business Continuity-Disaster Recovery Planning in organizations. --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    9 mins
  • Case Study: Equifax Data Breach
    Mar 1 2022
    -Identified the type of attack, loopholes in the controls at Equifax that led to compromise, listed the security practices that could have prevented the breach, listed the precautionary measures Equifax implemented after the breach, why hackers are targeting the financial sector, why this breach didn’t affect Equifax as much as other breaches like Target and Anthem --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    8 mins
  • Sex Trafficking
    Dec 10 2020
    Exploring current research that aims to identify structural barriers to survivors of sex trafficking from receiving support and medical attention. Describing the criminalization of victims and how that impacts them, covering research on the lack of experience of health professionals and why this has implications for victims. I conclude by arguing how the healthcare system fails to respond. --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    20 mins
  • Lil Wayne(Trump) and Offset(Biden)
    Nov 1 2020
    Discussion of the upcoming election, Obama being used for his skin tone, Rapper Lil Wayne endorsing Donald Trump, and Rapper Offset supporting Joe Biden --- Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
    Show More Show Less
    6 mins