After watching the video, I think the social sciences are closely tied to the realm of digital forensics because at the end of the day. They both ultimately involve people both perpetrator and victim, to be exact. As the job of a digital forensics investigator is to identify what caused or what happened to a…
Career paper
The choice of career I would like to cover is the Information Security Analyst, their primary job is to plan and implement security measures in the networks of their parent organization. These companies include standard computing companies, business and security firms, and consulting firms. Alongside this role, they can also be responsible for implementing active…
Journal #12 What have YOU done wrong?
I think the five most troublesome violations one could do are: recording VoIP calls without consent, collecting children’s information, sharing sensitive data about others to the internet, illegal searches, and using copyrighted images. The first three reasons are similar in their severity, as VoIP tapping means that confidentially has been broken, collecting children’s information can…
Journal #11 Data breach economic forms
Classical Economic theory, Laissez-fair, Parsimony, and Objectivity. For Classical economic theory and Laissez-fair for the document, they both involve the fact. That until actual harm was done to the civil rights of the individual, the leak was kept under wraps as the company had no legal need to inform due to the hands-off nature of…
Journal #10 Article Review
The article, titled “Social Cybersecurity: An Emerging National Security Requirement,” details how not only can conventional wars of material and attrition be fought, but also how the war for the mind can be fought as well. To elaborate, the document details various strategies and reasonings on how discourse can be sowed into an enemy nations…
Journal #9 Social Media Disorder Scale
After taking the Social Media Disorder scale test, I received a score of 1.0. After some thought, I think that the test is geared toward those who were given relatively loose rules when it came to internet access with little to no guidance when it came to normal usage of the internet. I think it…
Journal #8 Cybersecurity In Movies
I think that hacking scenes in movies, accurate or not. Are more used to set the stakes or act as downtime development more often than not. As hacking scenes in movies can be a helpful form of plot development and can help showcase the capabilities of a cast member, they are often simplified or filled…
Journal #7 Meme
The main message behind this meme is that due to human systems integration in the organization, the cybersecurity professional can now have a reduced workload thanks to the fact that all systems and policies have been designed around the employees as a whole, retaining efficiency while improving security.
Journal #6 Real Websites and their Impostor’s
More often than not, the most dangerous and common variety of fake website is one that pretends that it is a legitimate website by copying it’s URL and layout to the best of the hackers abilities. However, there are several indicators of a websites validity, the first being obvious. More often than not, fake websites…
Article Review #1-“Do You Love Me? Psychological Characteristics of Romance Scam Victims”
This research paper documents the typical background and motivations of victims affected by online dating romance site frauds, the introduction gives a basic background on the subject at hand and is effectively the thesis to this entire paper. The next segments, known as Typology of Victims and Romance Scam Typology. Detail both the general characteristics…