Masters in Cybersecurity Program Blog

Intelligence is a global jigsaw puzzle, but bigger than any rainy-day pastime that one can buy in a box. There are more than 24,000 pieces—the biggest puzzle available on Amazon—and there is no picture on the box cover. Read, read, read, we tell our CYB-610 students. Read More

We had a great online discussion in Utica College’s CYB-633, Critical Infrastructures and National Security. I told the group that I had combined our discussions of industrial control systems (ISCs) and cyber terrorism because it seemed to me, ICSs are the crown jewels for online terrorists. Of course, there are plenty of malicious things that someone could do with other aspects of computers and networks, but to instill intense fear, attacks on ICSs are the most likely cyber avenue. Read More

In the cyber security industry, it is a well-known fact that the greatest threat to corporate documents comes from the inside as employees are given access to the internal network. Cyber security professionals have learned from the past, and today the Trojan attack is something most are familiar with and something that is routinely protected against. So hackers have changed the formula slightly. Instead of a program or device sneaking in, now an intruder is legitimately let in by the company. Here are two types of employee intruders to look out for. Read More

Students in application degrees, such as the Master of Science (MS) in Cybersecurity program, tend to forget that the program at its heart is still an academic program. What does this mean? Read More

In academic work, the student is constantly doing homework and looking up information. Many students produce written works based on things that they lookup. Guess what? You have been doing research! Many students hear the word research and think of scientists in a lab working on experiments. This is not always the case. As you progress through your higher education path, here are some ways your work can support your research needs at the next level. Read More