This video about the cybersecurity analyst job shows how much the role connects to social behavior. It’s not just about stopping attacks or fixing systems. Analysts have to work with people across different teams and explain threats in ways that make sense to everyone, not just tech experts. They also help train employees to spot…
CYSE 201: Journal Entry 10: Social Cybersecurity Article
Reading this article helped me understand how social cybersecurity focuses more on people and behavior than just systems and data. It breaks down how attackers use manipulation, like misinformation, fake profiles, and phishing, to target individuals and communities online. I thought it was interesting how the article emphasized that humans are often the weakest link…
CYSE 201: Journal Entry 9: Social Media and Cybersecurity
Even before doing this exercise, I had already been trying to cut back on how much time I spend on social media. So watching the Social Media and Cybersecurity video and taking the Social Media Disorder Scale came at an interesting time. After answering the questions honestly, I scored a 4 out of 9. That…
CYSE201 Journal Entry 8: How Media Shapes Our Understanding of Cybersecurity
After watching the YouTube video “Scientists Rate 65 Scenes from Movies and TV,” it is a great reminder of how much media can distort our perception of cybersecurity and hacking culture. As someone who’s only recently developed a passion for tech and cybersecurity, I can relate to the initial belief that hacking is all about flashy…
Identifying Fake Websites
In today’s digital age, recognizing fake websites is a basic yet essential skill for protecting personal and financial information. Cybercriminals are using advanced tools, including artificial intelligence, to design fraudulent websites that closely resemble legitimate ones, making it difficult for users to identify threats. For example, fake Amazon login pages often use deceptive URLs like…
CYSE201 Journal Entry 5: Ranking Motivations of Cyber Crime
I rank money as the most sensible and common driver of hacking (1). The financial incentive is clear and universal, with cases like the BitMart cryptocurrency breach showing how cyberattacks can result in millions of dollars in stolen assets. This motive is practical and often the primary reason behind organized cybercrime. Political motives come next…