Difference between revisions of "User:Wubbenhorst"
Wubbenhorst (talk | contribs) |
Wubbenhorst (talk | contribs) |
||
Line 12: | Line 12: | ||
Parkour (amateur), Linux, programming (languages include BASH, C, Java, Python, Mathematica, and R), Making, various kinds of homesteading, and hacking. (For more information on hacking, please read the essay '''Hackers and Painters''.) | Parkour (amateur), Linux, programming (languages include BASH, C, Java, Python, Mathematica, and R), Making, various kinds of homesteading, and hacking. (For more information on hacking, please read the essay '''Hackers and Painters''.) | ||
I am interested in the InfoSec world, and can often be found listening to podcasts and research talks. | I am interested in the InfoSec world, and can often be found listening to podcasts and research talks. | ||
+ | |||
+ | ==Grand Challenges== | ||
+ | |||
+ | One of the Grand Challenges of our time is securing cyberspace. Today, many of the Internet's exploits occur via humans to machines. The field of human exploitation (within the information security industry) is broadly referred to as ''social engineering.'' For HR departments, system administrators, and anyone else interested in securing documents of any value, a knowledge of social engineering tactics is crucial. | ||
+ | |||
+ | [http://www.social-engineer.org/framework/general-discussion/ The Social Engineering Framework], Social Engineer Inc., 2015, Last accessed 9/13/2015 (Grand Challenge) |
Revision as of 02:58, 14 September 2015
Background
I was born on in Boston, but have lived in Durham for most of my life.
Education
Much of my education was self-taught; my parents chose homeschooling as my educational path, which allowed me to pursue a variety of interests in both personal and academic contexts. I graduated in 2014 from Excelsior Academy and NCSSM (online program).
Interests
Over the years, my interests have included rowing, sailing, running, cycling, Legos, robotics, amateur photography, Parkour (amateur), Linux, programming (languages include BASH, C, Java, Python, Mathematica, and R), Making, various kinds of homesteading, and hacking. (For more information on hacking, please read the essay 'Hackers and Painters.) I am interested in the InfoSec world, and can often be found listening to podcasts and research talks.
Grand Challenges
One of the Grand Challenges of our time is securing cyberspace. Today, many of the Internet's exploits occur via humans to machines. The field of human exploitation (within the information security industry) is broadly referred to as social engineering. For HR departments, system administrators, and anyone else interested in securing documents of any value, a knowledge of social engineering tactics is crucial.
The Social Engineering Framework, Social Engineer Inc., 2015, Last accessed 9/13/2015 (Grand Challenge)