CYSE 201S Journal #11

As discussed in the module 10 PowerPoint, teamwork is a significant social behavior of a cybersecurity analyst. It is crucial for individuals to be able to work as a team player in cybersecurity because the protection of a system is a team effort. Additionally, communication and continued learning are other social behaviors that are necessary…

CYSE 201S Journal #10

David Beskow and Kathleen Carly, authors of Social Cybersecurity an Emerging National Security Requirement, explored social cybersecurity and the ways in which it is different from traditional cybersecurity. Social cybersecurity refers to “humans using technology to ‘hack’ other humans”; social cybersecurity creates a divide amongst many social groups. Beskow and Carly mention the Russians use…

CYSE 200T Journal #8

How can you tell if your computer is safe? The first and most simple way to ensure that your computer is safe, is to run a full system scan using anti-virus software; It is also important to keep anti-virus software up to date to ensure that it is catching the newest viruses. If an individual…

CYSE 201S Journal #9

I have had all forms of social media deleted for years now, so my answer to every question was no. However, when I was in the peak of using social media, my answers would have been much different. I think the items in the social media disorder scale are accurate and a lot of users…

CYSE201S Journal #8

After watching the video provided, about half of the movies and shows she referenced got a higher rating on portrayed accurateness, meaning the film writers did a decent job at giving a correct representation of real world cybersecurity. A reoccurring issue in the portrayal of cybersecurity by the media seemed to be the time it…

CYSE 200T Journal #7

Investing in a cybersecurity program is likely a smart move for almost all businesses, and should not be overlooked. The implementation of a cybersecurity program comes with its costs and benefits, which need to be weighed by the company or business to decide if its worth their time, effort, and money. The first cost of…

CYSE 201S Journal #7

Me trying to learn everything I can about cybersecurity so I can be educated and protected and not make silly mistakes like most users: https://unsplash.com/photos/gySMaocSdqs I would relate this meme to human systems integration (HSI) because of the training aspect of HSI. It is crucial for users and employees to be effectively trained and educated…

CYSE 201S Journal #6

There are loads of online users that fall for the scam of a fake website, so being informed and aware will highly reduce the chances of falling victim to scammers. The first thing to look out for is spelling; are there a bunch of spelling and/or grammatical errors? Next, users can take a look at…

CYSE 200T Journal #6

Workplace deviance in this discussion will be defined as the intentional act of and desire to bring harm or damage upon one’s own workplace. Cyber technology has created more opportunities for individuals who might be motivated financially or by personal vendetta to cause damage to their workplace. A common situation that incorporates the use of…

Article Review 1

Article Review 1             In the article linked above, “Understanding the Connection Between Hackers and Their Hacks: Analyzing USDOJ Reports for Hacker Profiles”, a significant question was examined: what are the relationships between the age, gender, and nationality of hackers and the sophistication level of their hacks? Social science and cybercrime are undeniably interrelated, and…