CYSE 200T Journal #13

Cybersecurity is an ever-evolving entity that consequently requires new and updated cyber policies and infrastructures. When considering the development of cyber policy and infrastructure coupled with the “short arm” of predictive knowledge, it could be beneficial to plan and develop only for what we do know. We can try our best to forecast or predict…

CYSE 200T Journal #12

As cyber technology has become more integrated into our everyday lives there is bound to be both positive and negative impacts such as the increase in cybercrime. There has been a significant shift in the way we see crime from before and after technology was introduced. Previously, the only way for a criminal to steal…

Article Review 2

Article Review 2 11/1/2023  The interrelatedness of cyberbullying and depression among adolescents Principles of Social Science In this technological age, where internet users are getting younger and younger, we have to ask if and how the use of technology and social media sites are damaging or negatively impacting our youth. The above article examines the…

CYSE 201S Journal #15

Davin Teo shares his experience of what events led him into his career as a digital forensics investigator; he goes on to explain how he was originally an accountant, and took up a job opportunity with the company he was currently working for as an IT specialist because he already possessed some knowledge/interests for computers…

CYSE 201S Journal #14

In the blog post 11 Illegal Things You Unknowingly Do on the Internet, the author Slynchuck discusses 11 common, but illegal behaviors of online users. I believe the 5 most serious of the list includes collecting information about children, bullying and trolling, faking your identity online, sharing addresses, passwords or photos of others, and using…

CYSE 200T Journal #11

Studying cybersecurity undoubtedly requires an interdisciplinary approach and viewpoint that includes the study of criminal justice and criminology. Cybercrime is a class of crime that utilizes the exploitation of computers, technology, and the internet to carry out illegal acts. In module 2, it was discussed that criminology and criminal justice raise the questions that cover…

CYSE 201S Journal #13

I believe that bug bounty policies overall are an effective means to enhance ones cybersecurity, and can be a beneficial investment for most businesses. In the paper “Hacking for good: Leveraging HackerOnedata to develop an economic model of Bug Bounties”, the authors highlighted six of their key findings. First, they found that most hackers are…

CYSE 201S Journal #12

After reading the sample breach letter, I believe the two economics theories that can be viewed in relation to the letter is the rational choice theory and the Marxian economic theory. The rational choice theory refers to the idea that individuals will make decisions with their best interests in mind. In the sample letter, the…

CYSE 200T Journal #10

As with anything cyber related, cyber networks require continuous updates and developments in order to continue prioritizing their security. Cybersecurity is a ever-evolving industry that will always have need of continuous learning. Moreover, as a simple definition, engineers are tasked with solving problems within, creating and maintaining systems using scientific knowledge. In specific, network security…

CYSE 200T Journal #9

Technology and computers have both made the world safer and less safe for different reasons. Technology is so integrated into our everyday lives now, and it provides a lot of ease and modern day conveniences that we didn’t once have. Some examples of how computers have made the world safer could include the use of…