Online Actions, Real-World Consequences: Avoiding Serious Legal Pitfalls on the Internet Nick Youngson More people are online than ever before. This rapid transition to the digital world can lead to some people unknowingly making unlawful decisions. In his article “11 Illegal Things You Unknowingly Do on the Internet,” Andy Slynchuk points out 11 common things…
Week 11: Journal Entry 13
The Power of Bug Bounty Policies: Economic Solutions for Cybersecurity Casimiro Literature Review The research paper “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” highlighted the impact of a Bug Bounty Policy. A Bug Bounty Policy offers an economical solution, enabling enterprises to engage with freelance security researchers to…
Week 11: Journal Entry 12
Exploring Social Science Theories in Cybersecurity: The Glasswasherparts.com Data Breach Blogtrepreneur The “Sample Data Breach Notification” is a letter notifying patrons of glasswasherrparts.com that their third-party platform provider was compromised by malware. Data containing customer credit and debit card numbers, prior purchase history, names, addresses, and phone numbers have been stolen. This data breach directly…
Week 10: Journal Entry 11
Beyond the Code: Social Behavior in Cybersecurity Denisismagilov Cybersecurity Analyst A cybersecurity analyst protects an organization’s computer systems, networks, and data from security threats, unauthorized access, and cyberattacks. This involves monitoring, identifying, analyzing, and responding to security incidents. To be successful in this highly technical job, one must know social behaviors. Three responsibilities of a…
Week 10: Journal Entry 10
Social Cybersecurity: Guarding Against Modern Information Warfare Airman Magazine The article “Social Cybersecurity: An Emerging National Security Requirement,” written by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley, demonstrates how “social cybersecurity” is a national security threat. Today’s connected technologies eliminate the need for physical proximity to influence society. Bad actors use the…
Week 9: Journal Entry 9
The Risk of Social Media Social Media Disorder Scale I scored one out of nine on the Social Media Disorder (SMD) Scale. I answered “yes” to number 4, “trying to spend less time on social media, but failed?”. I have a timer on my phone that asks if I would like to continue using Instagram…
Week 8: Journal Entry 8
Media Influence: How Distorted Narratives Impact Public Cybersecurity Awareness credit: Alicja Nowakowska/iStock The media plays a vital role in the public’s understanding of cybersecurity. However, the media’s primary economic model requires viewership to sell advertising space or movie tickets, which can sometimes affect storylines. The rampant misinformation and disinformation occasionally presented to increase viewership significantly…
Week 7: Journal Entry 7
Strengthening the Weakest Link: The Importance of a Human-Centered Cybersecurity Model The human-centered cybersecurity model prioritizes human behaviors and interactions with technology to complement technical solutions like firewalls and encryption. Noble (2018) research shows that human cyber errors are responsible for 80-90% of security breaches in the U.S. and the U.K. (p. 74). These mistakes…
Week 6: Journal Entry 6
Spotting the Red Flags: How to Identify Fake Websites and Avoid Cyber Scams According to Forbes, there are currently 5.35 billion internet users, and that number is expected to grow to 7.9 billion by 2023. Cybercrime is a numbers game. If cybercriminals can get one-half of one percent or just .5% of internet users to…
Week 5: Journal Entry 5
Ranking Motivations for Cybercrime: Exploring the Complex Drivers Behind Cybercriminal Behavior I have ranked the following motivations for cybercrime from what makes the most sense to the least. Attached to each motivation is the article link used to provide examples for each motive.