Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The NICE framework is used by the cybersecurity community across the board. The framework generalizes cybersecurity as definition and what its key…
Career Professional Paper
When studying many job titles in cybersecurity, one in particular stood out to me the most. This job title was interesting to me because not only is it a vital position in the cybersecurity field but also in the tangible world in a criminal justice aspect. The job title is a Digital Forensic Examiner and…
Article #1 Review
Article: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/89/26 This article is called Designing predictive models for cybercrime investigation in Iraq. This article is talking about the benefits of PA also known as predictive analytics. The concept of predictive analytics allows businesses and companies to stay ahead of cyber crime. This is done by actively staying aware of indicators that cyber crime…
Article #2 Review
Article: https://academic.oup.com/cybersecurity/article/5/1/tyz002/5366419The article I chose to analyze is titled: Content analysis of cyber insurance policies: how do carriers price cyber risk? The purpose of this article was to conduct effective, qualitative research that assesses the underwriting process for cybersecurity firms and what leads them to their price points for these services. An important step in…
Journal Entry #13
Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watchthis video and think about how the career of digital forensicsinvestigators relate to the social sciences. Write a journal entrydescribing what you think about the speaker’s pathway to his career. Those who work in digital forensics are similar to those who work in real forensics alongside…
Journal Entry #12
Andriy Slynchuk has describedeleven things Internet users dothat may be illegal. Review whatthe author says and write aparagraph describing the fivemost serious violations and whyyou think those offenses areserious. The five most serious violations from the list are, Using unofficial streaming services, sharing passwords, address or photos of others, bullying and trolling, faking your identity…
Journal Entry #11
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter“SAMPLE DATA BREACH NOTIFICATION” and describe how twodifferent economics theories and two different social sciencestheories relate to the letter. In this sample breach notification, a major company is letting their customers know that they have been investigating a breach that occurred through their third-party platform provider. This breach included the…
Journal Entry #10
Read this and write a journal entry summarizing your response to thearticle on social cybersecurity. This article characterizes the difference between technical cybersecurity and social cybersecurity. When studying cybersecurity in the technical aspect, we are focusing more on the technology and the scientific aspects of the subject. When looking at cybersecurity from a social science…
Journal Entry #9
Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? After completing the scale, I noticed that I only answered yes on 3 out of the 9 questions. I feel as though for me that…
Journal Entry #8
Write a journal entry about how you thinkthe media influences our understanding about cybersecurity While media has a heavy influence on many things in our lives it is clear to see the medias conception of cybersecurity. I notice that in a lot of movie scenes they like to jazz up the technical looks and computer…
Journal Entry #7
Review the following ten photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s).