Journal Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon https://www.youtube.com/watch?v=Pf-JnQfAEew Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Digital forensics investigators collect and analyze various types of electronic data and preserve them…

Journal Entry #14

Andry Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. After reviewing Andriy Slynchuk’s article about 11 things Internet Users do that may be illegal, the 5 I view…

Journal Entry #13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…

Journal Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The sample data breach notification displayed how a business failed to safeguard their customer’s information by relying on a third-party organization for their cybersecurity. It is…

Journal Entry #11

Nicole Enesse does a great job of breaking down what exactly is the role of a Cybersecurity Analyst. One of the big things she mentions is that it’s an entry-level position and one of the big things you would be doing is essentially providing customer service. Another name for the role is Cybersecurity Help Desk…

Journal Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site. The US military has brought forth a new area of national security that is called Social Cybersecurity. Social Cybersecurity is the use of technology to influence human behavior, social structures and political outcomes utilizing…

Journal Entry #9

I replied yes to 1 out of the 9 questions on the Social Media Disorder Scale. The only question I replied yes to was neglecting other activities to spend time on social media. This is a dilemma that I face often when I have to do my homework. It’s probably due to my procrastination, but…

Journal Entry #8

The media, like Hollywood, tends to romanticize or make hacking seem “cool,” and inmost aspects, it is unrealistic. Keren Elazari, an internationally recognized securityanalyst, talks about how unrealistic some, if not most, of the scenes from Hollywoodare. Common things she mentioned across the 12 films are how quick hacking is, whenit takes a lot longer,…

Journal Entry #7

The Cybersecurity Human Integration framework is the practice that technology is not only about technology but also human behavior and the interaction with security systems. The framework tries to bridge the gap between technology and humans to improve overall cybersecurity. Certain aspects of the framework include emphasizing that human make errors and utilizes methods such…

Journal Entry #6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake websites are prevalent throughout the internet and are tools and ways thatcyberattacks, and hackers utilize to steal information from their targets. Examples offake website that attackers like to utilize, and…

Journal Entry #5

Review the articles linked with each individual motive in the presentation page or Slide #3.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. Crime is a choice…

Journal Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. The Maslow’s Hierarchy of Needs is a theory that all humans have needs. The theorysuggests that once our needs are met, we climb up the…

Journal Entry #3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. PrivacyRights.org is a website that displays publicly available information about the databreaches, that occurs throughout the United States. After reviewing some of the information on the site, it seems to be…

Journal Entry #2

Explain how the principles of science relate to cybersecurity. In 1970, Robert Bierstedt argued that social sciences, followed the same principles as natural sciences. He argued that social sciences are just as scientific as natural sciences, and if Cybersecurity were to adhere to this theory, it could be viewed through the lens of a social…

Journal Entry #1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE Workforce framework, I was intrigued by the Protection andDefense component, specifically the threat and vulnerability analysis. Currently, I aminterested in…