Applying Scientific Principles to Strengthen Cybersecurity Strategies Picryl The seven scientific principles of relativism, objectivity, parsimony, empiricism, skepticism, ethical neutrality, and determinism align with cybersecurity. Relativism provides the understanding that all things in the cybersecurity field are related; changes in one system change things in others. Any change in societal, educational, political, technological, criminal justice,…
Category: CYSE201S Journals
Week 1: Journal Entry 1
Exploring Cybersecurity Career Paths: Aligning Interests with the NICE Framework WIKIMEDIA COMMONS After reviewing the NICE Workforce Framework, I’ve identified areas that interest me and others that are less appealing. Given my limited knowledge in cybersecurity, I am less interested in the Work Role Categories of Oversight and Governance (OG) and Design and Development (DD)….
Week 15: Journal Entry 15
From Accounting to Digital Forensics: David Teo’s Journey Bridging Financial Expertise with Cyber Investigations NARA & DVIDS PUBLIC DOMAIN ARCHIVE Understanding Human Behavior in Financial and Cyber Crimes Accountants like David Teo, especially those specializing in forensic accounting, possess a unique skill set that aligns closely with the competencies required in digital forensic investigations. Accountants…
Week 12: Journal Entry 14
Online Actions, Real-World Consequences: Avoiding Serious Legal Pitfalls on the Internet Nick Youngson More people are online than ever before. This rapid transition to the digital world can lead to some people unknowingly making unlawful decisions. In his article “11 Illegal Things You Unknowingly Do on the Internet,” Andy Slynchuk points out 11 common things…
Week 11: Journal Entry 13
The Power of Bug Bounty Policies: Economic Solutions for Cybersecurity Casimiro Literature Review The research paper “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” highlighted the impact of a Bug Bounty Policy. A Bug Bounty Policy offers an economical solution, enabling enterprises to engage with freelance security researchers to…
Week 11: Journal Entry 12
Exploring Social Science Theories in Cybersecurity: The Glasswasherparts.com Data Breach Blogtrepreneur The “Sample Data Breach Notification” is a letter notifying patrons of glasswasherrparts.com that their third-party platform provider was compromised by malware. Data containing customer credit and debit card numbers, prior purchase history, names, addresses, and phone numbers have been stolen. This data breach directly…
Week 10: Journal Entry 11
Beyond the Code: Social Behavior in Cybersecurity Denisismagilov Cybersecurity Analyst A cybersecurity analyst protects an organization’s computer systems, networks, and data from security threats, unauthorized access, and cyberattacks. This involves monitoring, identifying, analyzing, and responding to security incidents. To be successful in this highly technical job, one must know social behaviors. Three responsibilities of a…
Week 10: Journal Entry 10
Social Cybersecurity: Guarding Against Modern Information Warfare Airman Magazine The article “Social Cybersecurity: An Emerging National Security Requirement,” written by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley, demonstrates how “social cybersecurity” is a national security threat. Today’s connected technologies eliminate the need for physical proximity to influence society. Bad actors use the…
Week 9: Journal Entry 9
The Risk of Social Media Social Media Disorder Scale I scored one out of nine on the Social Media Disorder (SMD) Scale. I answered “yes” to number 4, “trying to spend less time on social media, but failed?”. I have a timer on my phone that asks if I would like to continue using Instagram…
Week 8: Journal Entry 8
Media Influence: How Distorted Narratives Impact Public Cybersecurity Awareness credit: Alicja Nowakowska/iStock The media plays a vital role in the public’s understanding of cybersecurity. However, the media’s primary economic model requires viewership to sell advertising space or movie tickets, which can sometimes affect storylines. The rampant misinformation and disinformation occasionally presented to increase viewership significantly…