The speaker’s journey into digital forensics struck me as a typical path that many stumble upon. Initially unfamiliar with the profession, he was driven by curiosity to delve into something new. His enthusiasm for the field was clear, and after watching his presentation, I feel compelled to pursue a career in digital forensics myself. His…
Career Paper
I have chosen many career paths in my life to set me up in my future, since I’ve joined the military, I have been interested in intelligence/ cybersecurity. A career choice that I would like to pursue in the future is a Digital Forensics Analyst. Digital forensics analysts are tasked with investigating cybercrimes, including hacks, data breaches,…
Journal Entry #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
There are a multitude of illegal activities that individuals engage in daily, often without realizing the severity of their actions. Among the top five serious offenses I’ve identified are: sharing passwords, addresses, and photos of others, engaging in bullying and trolling behavior online, assuming false identities on the internet, conducting illegal searches, and utilizing unofficial…
Journal Entry #12: describe how two different economics theories and two different social sciences theories relate to the letter.
In the letter about the data breach on www.glasswasherparts.com, different social theories can help us understand what happened. Marxian theory says there’s a power imbalance between the company and its customers. The breach shows the company didn’t protect customer data well, taking advantage of people’s trust for its own gain. Classical theory says markets should…
Journal Entry#13 Read this article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
In summary, the success of bug bounty policies can be measured by their ability to reveal vulnerabilities, enhance system security, and foster collaboration between organizations and security researchers. While they have shown promise in bolstering cybersecurity defenses, their effectiveness lies on factors such as program clarity, reward adequacy, and organizational responsiveness. In my view, I…
Article Review #2 : Covid-19 and social media: Social isolation or cyber bullying
The article I chose to review was from The Journal of Cybersecurity intelligence and Cybercrime called Cyberbullying during COVID-19 Pandemic: Relation to Perceived Social Isolation among college and university students, by Nadya S. Neuhaeusler, M.S, University of Michigan-Dearborn. This article researched how the increase in technology use during the COVID-19 global pandemic affected the lives…
Journal Entry#11: think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
In a cybersecurity analyst job, I observed several social themes that came up that show how vital human interactions are in cybersecurity. One big theme is teamwork and communication. Most cybersecurity analysts work together in groups, so being able to talk and work well with others is key to spotting and dealing with cyber threats…
Journal Entry #10: Read this and write a journal entry summarizing your response to the article on social cybersecurity.
In the article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD, talks about how cybersecurity is not only the practice of safeguarding computers but is also connected to how people interact socially. The authors of this article state that just focusing only on the technical side…
Journal Entry# 9 : Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I scored a 4/9, The choices that were given were very realistic because a lot of people have trouble getting off their phone. Different patterns may be found around the world because different countries view of social media is very different from America most people don’t even use social media in other countries, or they…
Journal Entry#8: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
The media influences our understanding about cybersecurity in many ways such as depicted in the videos the cyber hackers were very fast and efficient at hacking into a system. In real life hacking takes time and it takes some form of knowledge of the user, for instance there was a scene in the video that…