The Cybersecurity job I have chosen to write about is cyber crime investigations. The main social science being used in this job is of course criminology, also known as the study of how and why a crime happened, those who are behind the crime that happened, and how our society might react to said incident….
Career Paper
Currently not uploaded due to Turnitin score pointing back at this website.
Journal Entry 15
The career of digital forensic investigators relates to social sciences in several ways. The first way is the high amount of financial crimes and the loss of literal money from said crimes, digital forensic investigation relates to economics. The impact of financial crimes on the economy has risen dramatically since the pandemic, with more and…
CYSE Journal Entry 14
Jon Rice CYSE Journal Entry 14 I think the five most serious violations that internet users might do are, I think Illegal searches are easily the worst offense if done intentionally, searching up how to do something like make a bomb makes you a possible serious to the authorities and other civilians. Sharing things…
CYSE Journal Entry 13: Bug Bounty Policy
Companies of all types and sizes can crowdsource bug finding by allowing the open bounties for the hackers who use their skills in a positive and professional capacity. The main advantage is that instead of having a single person on staff you can have many people paid in smaller increments to all be looking at…
CYSE Journal Entry 12: Glass Washer Parts Data Breach
One of two prominent economic theories that can be seen in the Glass Washer Parts data breach letter to its customers is definitely Laissez-fare economic theory because the government did not intervene right away, and in fact allowed the breach to continue while the law enforcement arm of the government observed and did not intervene. …
Journal 10
My response to this article on social cybersecurity is that It is accurate, information warfare is extremely important and something we need to take precautions with. It specifically identifies how Russia has maneuvered their former types of warfare into the cyber world. In today’s day and age, the decentralization of information has also diluted the…
Journal 11
The social themes in this video presentation with the cybersecurity analyst jobs with regards to social behaviors. This video seems like it really starts with the human firewall and needing to educate employees on cybersecurity and detecting and patching the network for threats. Analysts have to be able to spot phishing attacks, they need to…
Social Media Disorder Scale
I scored a three out of nine on the Social Media Disorder Scale. The items in the scale probably most Americans based on their general consumption of social media will have at least two or more, but not necessarily enough items to consider it a true disorder. Cultures heavily influences what is considered acceptable as…
How media tends to present hackers
In movies/tv shows hackers tend to be portrayed poorly, not always but most of the time. In movies/tv shows they generally take very minimal amounts of time to breach firewalls and in general hack into devices/software, on top of that we see hackers in films plug in a device like a laptop directly into some…