Thinker Fanatic Angel Mejia
-
- Education
Hi everybody,
I’m Angel Mejia, currently working on Master’s degree in Cybersecurity.
I have a Bachelors in Psychology.
I will be questioning, investigating, finding truth, looking at different sides/perspectives when it comes to psychology and cybersecurity
Thank you for listening, I will be posting a podcast on a biweekly basis.
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support
-
White Hat (Reconnaissance)
-Picked an organization and executed a bit of passive reconnaissance on the target. Provided as much data on the organization that is possible from publicly available sources. -Provided an explanation of the reconnaissance techniques that consist of ping sweeping, packet sniffing, port scanning, phishing, social engineering, and provide an example for each. Also, provide recommended defense tactics for each scenario
---
Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support -
Answer to Cybersecurity
The requirement is to be able to comprehend psychology. One must find out how workers think, but above all one needs to understand how attackers think. Once one has that in their belt, they will have the knowledge to take charge and prevent data leaks and cyberattacks.
By comprehending how one thinks and behaves- and why - one can be ready to develop their security position.
Some of the questions that need to be considered are:
● What equity needs to be protected and who can obtain it.
● What safety equipment is already in use and how they influence the participation of the users.
● How many times do you interact in cybersecurity classes with people and what do classes have to do with them?
● Figuring out if one works with outside companies to run phishing campaigns or social engineering attacks
● What personal devices are present in the work area such as tablets, smartphones, etc.
● Password guidelines and if workers follow them
● Attitude towards cybersecurity in a business.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support -
Advocacy Report On Eating Disorders
There are many eating disorders such as anorexia, bulimia and binge eating, some of the most common. All of them can have serious issues. Eating disorders are classified as illnesses that involve eating habits that are not healthy and fixation with body weight, shape, along with food. Eating disorders have one of the highest loss of life rate of mentally ill disorders. This
disorder affects around 10 in 100 teen girls in the United States. Based on the statistics one can really see that eating disorders are very relevant in society and need to be addressed. There are many contributing factors for why a teen girl may develop an eating disorder and the one’s I will discuss are social media, stress, and abuse. The consequences for eating disorders are harmful to teen girl’s health, psychological well being, and relationships. The solutions for these issues are treatment, education, and prevention.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support -
Cybersecurity Investigations
1. Explaining the legal challenges faced by an organization during an investigation while pursuing cyber attackers. Framed my answer based on the following points:
o Authorization needed to gather evidence
o Identifying evidence
o Admissible evidence
o Evidence handling
o Maintaining chain of custody
2. Explaining the working of the International Multilateral Partnership against Cyber Threats organization (IMPACT). How does IMPACT affect what we do in the US and abroad?
3. How does the Wassenaar Arrangement affect information security?
4. If an employee is found guilty of disclosing a company’s confidential data.
What national laws are applicable to him? What are the laws applicable to him if this is a case of cross-border disclosure of information? Do I think security awareness trainings would have helped in this case?
---
Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support -
Cybersecurity in Organizations
cybersecurity, what are the roles and responsibilities of organizations?
Policymaking
Role of an individual
Laws and regulations
Security awareness
Monitoring
Compliance
implementing BCM as per ISO 22301. Describe 6 critical processes and include all the necessary fields required by the standard.
Emerging and future technologies that organizations have to worry most about from a security perspective?
Explained the need for Business Continuity-Disaster Recovery Planning in organizations.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support -
Case Study: Equifax Data Breach
-Identified the type of attack, loopholes in the controls at Equifax that led to compromise, listed the security practices that could have prevented the breach, listed the precautionary measures Equifax implemented after the breach, why hackers are targeting the financial sector, why this breach didn’t affect Equifax as much as other breaches like Target and Anthem
---
Send in a voice message: https://podcasters.spotify.com/pod/show/angel-joel-mejia/message
Support this podcast: https://podcasters.spotify.com/pod/show/angel-joel-mejia/support