Journal Entry 12

The article “11 Illegal Things You Unknowingly Do on the Internet” gives examples of what we do every day that is illegal. It doesn’t state what five are major violations out of 11 but I’ll start with collecting information about children, sharing passwords, addresses, or photos of others, bullying, and trolling, faking your identity online,…

Journal Entry 11 pt 2

In the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” they use the Bug Bounty Policy to figure out vulnerabilities in company code basis. Their research discovered that hackers are inconsiderate regarding price and spending. They found that Bug Bounties are helpful for companies regardless of size. Then…

Journal Entry 11 pt1

In the “Sample Data Breach Notification” speaks on a data breach happening to a company that is for window washing. An economic theory that this relates to would be the Laissez-Faire economic theory as the government gets involved but they try to figure out the breach. Another theory was the classical economic theory which depending…

Journal Entry 10 pt 2

In the video “What does a cybersecurity analyst do? Salaries, Skills & Job Outlook” the creator speaks on the career field of a cybersecurity analyst. The creator talks about networking, networking is a way to meet people and a good way to expand in the field. In ways networking relates to social behaviors as one…

Journal Entry 10 pt1

Social Cybersecurity is the science study that revolves around humans and their behavior. In the article “Social Cybersecurity An Emerging National Security Requirement” touches on the fact of social cybersecurity expanding and with the expansion of that, there is a concern for future warfare. They want to bring more attention to social cybersecurity and build…

Journal Entry 9

I have completed the Social Media Disorder scale and I scored a 1.0. If I were to score a 5.0 or higher I would’ve been diagnosed as a disordered social media user. The items on the scale were quite interesting as they brought up issues of social media coming in between relationships, making it sound…

Journal Entry 8

After watching the video “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” the media influences our understanding of cybersecurity as they show coding and certain types of hacking and how those types of hacking are done, they also make it look quick and easy to dissolve when in reality…

Journal Entry 7

This meme relates to Human System Integration as HUI primarily focuses on traits within people and to make sure that HUI focuses on including these traits in new systems. The meme below is a Pomeranian who is online and wondering if there are other people like them online as seen in the thought bubble.

Journal Entry 6

Comparing fake websites to real websites: Fake Websites: http://abcnews.com.co Real Websites: https://abcnews.go.com/ Although I couldn’t find three fake websites due to them being blocked from the browser I have listed a fake website that was supposed to be ABC News and compared it to the actual link for the ABC News. For the fake website,…

Journal Entry 5

The motive of boredom causing cybercrime, I would rate that a 7 it doesn’t make sense to do a crime or harm others just because of boredom. Recognition would be a 6 just because there are other ways to get recognition than to try to hack. The motive of entertainment would be rated a 5,…