Journal Entry 14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.                The article highlights several everyday illegal activities on the internet, but five of the most serious violations, in…

Journal Entry 15

             As described by the speaker in the TEDx talk, the digital forensics investigator’s career intersects with various aspects of the social sciences, offering an intriguing perspective on the evolving relationship between technology and society. The speaker’s journey into digital forensics reflects the interdisciplinary nature of this field, which draws on principles from computer science,…

Journal Entry 13 Bug Bounty Policies

The use of policies in bug bounty programs is a critical aspect of managing these initiatives effectively. The literature review in the provided passage highlights some of the challenges and complexities associated with measuring the impact of bug bounty programs accurately. It acknowledges the potential for endogeneity issues and the need for sophisticated statistical techniques…

Journal Entry 12 Case Study

Economic Theory: Rational Choice – The concept of rational choice theory can be applied here as individuals/businesses are advised to make choices in their best interest to minimize potential harm or losses. In the letter, customers are encouraged to contact their credit or debit card companies immediately to protect themselves from possible identity theft. This…

Journal Entry 11

         In the video about the cybersecurity analyst job, several social themes and behaviors emerge. First, the speaker emphasizes the importance of networking and building connections within the industry, highlighting the role of networking events and meetups. This highlights the importance of the social dimension in the process of job growth, wherein the cultivation of…

Journal 10

Social Cybersecurity an emerging national security requirement. Army University Press. (n.d.). The article discusses the emerging discipline of social cybersecurity, which focuses on understanding and forecasting cyber-mediated changes in human behavior, social, cultural, and political outcomes. It highlights the role of technology in enabling state and nonstate actors to manipulate information and influence societies in…

Journal 9

How did you score? What do you think about the items in the scale?  Why do you think that different patterns are found across the world? I met several of the criteria for a “disordered social media user” diagnosis, as specified by the DSM. It’s important to note that this scale is designed to assess…

Journal 8

After watching the video “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” The profound impact of media, namely movies and television, on our cognition and comprehension of cybersecurity is a topic that has prompted my contemplation. The video critically analyzed hacking scenarios shown in movies and TV programs, highlighting…

Journal 7

These memes relate to the HSI framework by emphasizing the central role of users in the cybersecurity equation. The importance of user-centric approaches, education, collaboration, and participation is emphasized in order to improve cybersecurity practices and establish a more secure digital environment for all individuals.Individual Engaging in Typing Activity: “Enhancing Digital Security through Incremental Keystrokes.”…

Journal Entry 6

Fake websites frequently demonstrate irregularities in their uniform resource locators (URLs), substandard website design, and no authentic contact details. In addition, they may present alluring propositions that appear excessively advantageous. In contrast, authentic websites are affiliated with well-established companies, utilize secure HTTPS connections, and promote the well-being and satisfaction of users. It is imperative to…