Cybersecurity in Healthcare: Protecting Patient Data and Public Health
Author: afiel026
CYSE 201: Journal Entry 14: Top Five Internet Violations and Why They Matter
After reading “11 Illegal Things You Unknowingly Do on the Internet” by Andriy Slynchuk, I reflected on which actions pose the greatest risks to individuals and society. Some violations are minor, but others can lead to serious harm or legal consequences. In my view, these five stand out as the most concerning because of their…
CYSE 201: Journal Entry 13: Bug Bounty Policies
This article breaks down how bug bounty programs work and why they matter. From the literature review, it’s clear that these policies are built around cost-benefit thinking. Instead of hiring full-time security teams to find every vulnerability, companies open up their systems to ethical hackers who get paid when they find something useful. This approach…
CYSE 201: Journal Entry 12: Economic and Psychological Theory Connections to Data Breach Example
Even though this is just a sample breach letter, it still shows how real cybersecurity situations connect to both economics and psychology. From the economics side, the rational choice theory fits the attackers. They didn’t just randomly hit a system. They chose a platform that gave them access to customer payment data over a long…
CYSE 201: Journal Entry 11: Video Review – What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook
This video about the cybersecurity analyst job shows how much the role connects to social behavior. It’s not just about stopping attacks or fixing systems. Analysts have to work with people across different teams and explain threats in ways that make sense to everyone, not just tech experts. They also help train employees to spot…
CYSE 201: Journal Entry 10: Social Cybersecurity Article
Reading this article helped me understand how social cybersecurity focuses more on people and behavior than just systems and data. It breaks down how attackers use manipulation, like misinformation, fake profiles, and phishing, to target individuals and communities online. I thought it was interesting how the article emphasized that humans are often the weakest link…
CYSE 201: Journal Entry 9: Social Media and Cybersecurity
Even before doing this exercise, I had already been trying to cut back on how much time I spend on social media. So watching the Social Media and Cybersecurity video and taking the Social Media Disorder Scale came at an interesting time. After answering the questions honestly, I scored a 4 out of 9. That…
CYSE201 Journal Entry 8: How Media Shapes Our Understanding of Cybersecurity
After watching the YouTube video “Scientists Rate 65 Scenes from Movies and TV,” it is a great reminder of how much media can distort our perception of cybersecurity and hacking culture. As someone who’s only recently developed a passion for tech and cybersecurity, I can relate to the initial belief that hacking is all about flashy…
Identifying Fake Websites
In today’s digital age, recognizing fake websites is a basic yet essential skill for protecting personal and financial information. Cybercriminals are using advanced tools, including artificial intelligence, to design fraudulent websites that closely resemble legitimate ones, making it difficult for users to identify threats. For example, fake Amazon login pages often use deceptive URLs like…
CYSE201 Journal Entry 5: Ranking Motivations of Cyber Crime
I rank money as the most sensible and common driver of hacking (1). The financial incentive is clear and universal, with cases like the BitMart cryptocurrency breach showing how cyberattacks can result in millions of dollars in stolen assets. This motive is practical and often the primary reason behind organized cybercrime. Political motives come next…