Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. https://www.youtube.com/watch?v=Pf-JnQfAEew After watching Davin Teo’s Ted Talk, I am aware that digital forensics is related to the social sciences. It is very…
Week 13 Journal Entry 14
Andriy & Slynchuke has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. After reviewing Slynchuk’s blog post on Clario, the five most serious violations are: illegal searches on the internet,…
Week 12 Journal Entry 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…
Week 12 Journal Entry 12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Concerning the Sample Data Breach Notification letter, the economic theories related to this letter would be the Marxian Theory and the Laissez-Faire Theory. The Marxian Theory explains that people…
Week 11 Journal Entry 11
Watch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0 think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. Being a cyber analyst relates to multiple social behaviors that were mentioned in the module. It is important for people in this…
Week 11 Journal Entry 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b This article provides information about how social cybersecurity in relation to national defense. It shows how Bots, the spread of misinformation, lack of physical proximity and other factors are used to manipulate public opinion. After reading, I was…
Week 10 Journal Entry 9
Watch this Video: https://www.youtube.com/watch?v=Zbqo7MGVElw . Complete the Social Media Disorder Scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? After completing the social media disorder scale, my score was 3 out of 9 which is classified in…
Week 8 Journal Entry
Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube ( https://www.youtube.com/watch?app=desktop&v=6BqpU4V0Ypk ) After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. The video shows that…
Week7 Journal Entry
Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). Meme 1:This meme that I have created is about “shoulder surfing” and a type of social engineering in which someone actively looks over your shoulder in order to gain information…
Week 6 Journal Entry
Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent. Note: Don’t generate or click on unwanted/fake websites on your web browsers. Use examples from your sources…