Journal Entry 15

Watching Davin Teo’s TEDx talk on digital forensics was truly inspiring. His journey to his career in cybersecurity and forensics wasn’t linear, but it was a testament to his curiosity and determination. Initially, he seemed to be just a young person fascinated by technology. Still, he carved out a unique career path through perseverance and…

Journal Entry 14

Among the violations from the clario.co blog article “11 Illegal Things You Unknowingly Do on the Internet”, several are particularly serious due to their legal, ethical, and personal consequences. Using Unofficial Streaming Services: This often involves accessing copyrighted content without permission, which is illegal and deprives creators of their due earnings. It also poses a…

Journal Entry 13

This article examines the concept of bug bounties, a technique companies use to contract hackers to discover bugs and weaknesses in their systems’ infrastructure. This method of beefing up security is beneficial for a company by providing a cheaper alternative for organizations with limited resources. The experiments in this article aimed to measure several variables….

Journal Entry 12

The sample data breach notification relates to the cost/benefit analysis and Laissez-fare economic theories. Cost/benefit analysis can be applied as the business chose a service provider and the cybersecurity offered, weighing the cost of other potential service providers and increased security. According to this theory, the organization must have deemed the benefits of this service…

Journal Entry 11

Social themes that were raised during the Cybersecurity Analyst job outlook video that directly related to the job itself were outlined in the broad descriptions of the day-to-day work. She highlighted many of the junior tasks, in respect to entry level positions) will be concerning responding to phishing/social engineering attempts or providing guidance and training…

Journal Entry 10

The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley discusses the growing importance of social media platforms in national security. The authors highlight how cyber threats extend beyond technical breaches to influence public opinion, behavior, and societal cohesion. I found the focus on integrating social…

Journal Entry 9

I scored a 3 out of 9 on the Social Media Disorder scale. I believe when answered accurately, these questions may provide a good framework for identifying unhealthy relationships with social media, however I believe it may take more than a simple questionnaire to explore this phenomenon more deeply and how it’s affecting said person,…

Journal Entry Week 8

The entertainment industry incorporates bits of realism into media for special effect purposes, however these depictions significantly influence public perception of what cybersecurity is and what goes on behind-the-scenes in technology. Anything that isn’t common knowledge risks being misconstrued in the media, and cybersecurity isn’t an exception to this. Exposure to technology in society is…

Journal Entry Week 7

This individual, after realizing what he has done, sits on the ledge dramatically, pondering his mistake and the consequences of becoming a victim of phishing. This meme tackles cyber literacy and the psychology surrounding victimization. The second meme addresses the abuse of freedom during remote/hybrid work, the possible security risks, and the questioned productiveness of…

Journal Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake Websites This fake UPS page has an unofficial URL and encourages users to navigate through the website through surveys and a “timer”. Pages like this may use logos to help…