Journal 15

Prompt: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. I found Teo’s mention of how he was an accountant before becoming a digital forensics investigator interesting because the two fields…

Journal 14

Prompt: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. In my opinion, the worst of the potential cybercrimes that Slynchuk describes is faking an identity online. The…

Journal 13

Prompt: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure…

Journal 12

Prompt: Read this sample breach letter, “SAMPLE DATA BREACH NOTIFICATION,” and describe how two different economics theories and two different social sciences theories relate to the letter. This notification letter relates to the Laissez-faire economic theory’s idea that the government should only interfere with economics to protect the rights of citizens. Laws in all US…

Journal 11

Prompt: As you watch this video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. In the video, Nicole Enesse discusses several topics related to social themes and behaviors. For instance, she talks about how properly marketing oneself is…

Journal 10

Prompt: Read this and write a journal entry summarizing your response to the article on social cybersecurity. I found this article’s perspective on social cybersecurity insightful. Prior to reading it, I thought of social cybersecurity as more about exploiting human weaknesses to gain access to information systems and carry out further attacks. However, this article…

Journal 9

Prompt: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? I scored a 0/9 on the Social Media Disorder (SMD) scale. The primary reason for this score is likely that I barely…

Journal 8

Prompt: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity Media massively influences the general public’s perception of cybersecurity and its related occupations. Outside of people who work in cybersecurity or related IT fields, popular media is likely where most people are exposed to cybersecurity…

Journal 7

Prompt: Review the following ten photos through a human-centered cybersecurity framework. Create ameme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human-centered cybersecurity. Meme 1 The man in this picture is designing a program, and his only concerns are technical aspects and…

Journal 6

Prompt: How can you spot fake websites? Compare three fake websites (don’t access those sites, of course) to three real websites. What makes the fake websites fake? Fake site 1 (https://www.dhmo.org/): While the design of this website appears old, it uses a lot of technical languages that may make it seem that the site’s owner…