Davin Teo shares his experience of what events led him into his career as a digital forensics investigator; he goes on to explain how he was originally an accountant, and took up a job opportunity with the company he was currently working for as an IT specialist because he already possessed some knowledge/interests for computers…
Category: Journal Entries
CYSE 201S Journal #14
In the blog post 11 Illegal Things You Unknowingly Do on the Internet, the author Slynchuck discusses 11 common, but illegal behaviors of online users. I believe the 5 most serious of the list includes collecting information about children, bullying and trolling, faking your identity online, sharing addresses, passwords or photos of others, and using…
CYSE 201S Journal #13
I believe that bug bounty policies overall are an effective means to enhance ones cybersecurity, and can be a beneficial investment for most businesses. In the paper “Hacking for good: Leveraging HackerOnedata to develop an economic model of Bug Bounties”, the authors highlighted six of their key findings. First, they found that most hackers are…
CYSE 201S Journal #12
After reading the sample breach letter, I believe the two economics theories that can be viewed in relation to the letter is the rational choice theory and the Marxian economic theory. The rational choice theory refers to the idea that individuals will make decisions with their best interests in mind. In the sample letter, the…
CYSE 201S Journal #11
As discussed in the module 10 PowerPoint, teamwork is a significant social behavior of a cybersecurity analyst. It is crucial for individuals to be able to work as a team player in cybersecurity because the protection of a system is a team effort. Additionally, communication and continued learning are other social behaviors that are necessary…
CYSE 201S Journal #10
David Beskow and Kathleen Carly, authors of Social Cybersecurity an Emerging National Security Requirement, explored social cybersecurity and the ways in which it is different from traditional cybersecurity. Social cybersecurity refers to “humans using technology to ‘hack’ other humans”; social cybersecurity creates a divide amongst many social groups. Beskow and Carly mention the Russians use…
CYSE 201S Journal #9
I have had all forms of social media deleted for years now, so my answer to every question was no. However, when I was in the peak of using social media, my answers would have been much different. I think the items in the social media disorder scale are accurate and a lot of users…
CYSE201S Journal #8
After watching the video provided, about half of the movies and shows she referenced got a higher rating on portrayed accurateness, meaning the film writers did a decent job at giving a correct representation of real world cybersecurity. A reoccurring issue in the portrayal of cybersecurity by the media seemed to be the time it…
CYSE 201S Journal #7
Me trying to learn everything I can about cybersecurity so I can be educated and protected and not make silly mistakes like most users: https://unsplash.com/photos/gySMaocSdqs I would relate this meme to human systems integration (HSI) because of the training aspect of HSI. It is crucial for users and employees to be effectively trained and educated…
CYSE 201S Journal #6
There are loads of online users that fall for the scam of a fake website, so being informed and aware will highly reduce the chances of falling victim to scammers. The first thing to look out for is spelling; are there a bunch of spelling and/or grammatical errors? Next, users can take a look at…