Career Paper

I have chosen many career paths in my life to set me up in my future, since I’ve joined the military, I have been interested in intelligence/ cybersecurity. A career choice that I  would like to pursue in the future is a Digital Forensics Analyst. Digital forensics analysts are tasked with investigating cybercrimes, including hacks, data breaches,…

Journal Entry #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

There are a multitude of illegal activities that individuals engage in daily, often without realizing the severity of their actions. Among the top five serious offenses I’ve identified are: sharing passwords, addresses, and photos of others, engaging in bullying and trolling behavior online, assuming false identities on the internet, conducting illegal searches, and utilizing unofficial…

Journal Entry #12: describe how two different economics theories and two different social sciences theories relate to the letter.

In the letter about the data breach on www.glasswasherparts.com, different social theories can help us understand what happened. Marxian theory says there’s a power imbalance between the company and its customers. The breach shows the company didn’t protect customer data well, taking advantage of people’s trust for its own gain. Classical theory says markets should…

 Journal Entry#13 Read this article and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

In summary, the success of bug bounty policies can be measured by their ability to reveal vulnerabilities, enhance system security, and foster collaboration between organizations and security researchers. While they have shown promise in bolstering cybersecurity defenses, their effectiveness lies on factors such as program clarity, reward adequacy, and organizational responsiveness. In my view, I…

Article Review #2 : Covid-19 and social media: Social isolation or cyber bullying

The article I chose to review was from The Journal of Cybersecurity intelligence and Cybercrime called Cyberbullying during COVID-19 Pandemic: Relation to Perceived Social Isolation among college and university students, by Nadya S. Neuhaeusler, M.S, University of Michigan-Dearborn. This article researched how the increase in technology use during the COVID-19 global pandemic affected the lives…

Journal Entry#11: think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.

In a cybersecurity analyst job, I observed several social themes that came up that show how vital human interactions are in cybersecurity. One big theme is teamwork and communication. Most cybersecurity analysts work together in groups, so being able to talk and work well with others is key to spotting and dealing with cyber threats…

Journal Entry# 9 : Complete the Social Media Disorder scale.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

I scored a 4/9, The choices that were given were very realistic because a lot of people have trouble getting off their phone. Different patterns may be found around the world because different countries view of social media is very different from America most people don’t even use social media in other countries, or they…