You are currently viewing Gaming and Cybersecurity Insights: Navigating Digital Security in Creative Fields

Gaming and Cybersecurity Insights: Navigating Digital Security in Creative Fields

Today, Connor Elder, a UAT game art and animation major, joins us to discuss cybersecurity and personal security. Connor balances their love of game design with a sharp interest in cybersecurity, offering a distinctive viewpoint to the nexus of creative and technology. Let’s examine Connor’s perspectives on many facets of personal and digital security.

Connor, who goes by the pronouns he/him and they/them, recognizes the significance of cybersecurity in our tech-driven society. Even while Connor is not as well-versed in the subject as some, he nevertheless goes out of his way to keep up with pertinent cybersecurity news.

Connor takes a cautious stance when it comes to phone scams. Silence is answered to unknown callers unless it is verified that the call is scheduled. Connor uses Apple’s spam detection and phone screening to his advantage to be cautious when navigating any frauds.

Regarding the security of their passwords, Connor says he is confident in their robustness. Most accounts use password managers from Apple, Firefox, and Google religiously, and their passwords are generated at random. But there’s no denying the stress of having to keep them safe and the awareness of possible threats.

Connor has an open mind about the security of their educational setting. Although some students demonstrate proficiency in cybersecurity, many express apprehensions regarding the Ethics course and the IT department’s seeming indifference to possible network threats.

Connor’s reaction shows how uncomfortable they are to have their work scrutinized. Their valuing of privacy and control over their personal and professional works, whether in the physical or digital domain, reinforces the notion that consent is essential when it comes to matters of personal space.

Carrying pepper spray, an alarm, and a knife, Connor takes concrete measures to maintain his personal protection in the actual world. With location sharing, the family is informed. Connor is proactive in the digital sphere because of his prior experiences with family members’ lax cybersecurity procedures. They use various kinds of authentication, keep their passwords unique, and closely monitor their accounts—especially when it comes to important areas like their bank accounts.

Connor Elder’s insights offer a glimpse into the multifaceted approach one can take towards security, both in the digital and physical realms. As we navigate an increasingly interconnected world, understanding and implementing robust security measures become paramount. Connor’s journey serves as a reminder that security is a personal journey, shaped by individual experiences, values, and a commitment to staying informed in an ever-evolving digital landscape. Stay tuned for more personal perspectives on cybersecurity as we continue to explore the diverse experiences within our academic community.

Interview Conducted by UAT Student Alexis Sloan, Connect and Learn more LinkedIn STEM for Kiddos https://stemforkiddos.godaddysites.com/ Instagram @stem_for_kiddos

Connect and learn more about Connor Elder

To Learn More:

Vigilant Security

IoT Security Solutions: Navigating Challenges for a Safer Tomorrow


For more information on UAT:

University of Advancing Technology in Tempe, Arizona

Cybersecurity Program

UAT’s cybersecurity degrees are recognized for their excellence, with programs including undergraduate studies in Network Security, Network Engineering, and Technology Forensics, as well as a graduate program in Cyber Security. These programs are designed to propel graduates to the forefront of the industry, equipping them with the skills needed to become ethical hackers and cybersecurity professionals. The undergraduate Network Security degree emphasizes proactive techniques to protect information systems against potential exploitation, covering areas such as penetration testing and the development of exploits for identified vulnerabilities​​​​.

Business & Innovation Programs

UAT offers advanced degrees focusing on the intersection of technology and business, aiming to foster innovation and leadership skills. These include Business Technology, Technology Innovation, Technology Leadership, and Technology Studies, each designed to prepare students for leadership roles in technology-driven environments​​.

  • Business Technology (BS)
  • Technology Innovation (MS)
  • Technology Leadership (MS)
  • Technology Studies (BS)

Creation & Simulation Programs

For those interested in the creative aspects of technology, UAT offers degrees in Digital Maker and Fabrication, Human Computer Interaction, Robotics and Embedded Systems, and Virtual Reality. These programs are geared towards students looking to innovate in digital creation and simulation​​.

  • Digital Maker and Fabrication (BS)
  • Human Computer Interaction (BS)
  • Robotics and Embedded Systems (BS)
  • Virtual Reality (BS)

Alexis Sloan

Hi! My name is Alexis Sloan. I’m originally from Denver, Colorado but currently out in Tempe, Arizona attending The University of Advancing Technology getting a bachelors degree in network security and network engineering and in the future pursuing a masters in technology leadership. I have a project called STEM For Kiddos running, in GeekRho (student council) here on campus, President of Gardening Club, and anything else to keep me busy. From dying my hair to studying to crocheting at the end of the day I am happy to be here and have the opportunity to interview fellow students and bring awareness to others about cybersecurity. I hope you enjoy the insights from others within the blogs.

This Post Has 2 Comments

Comments are closed.