Davin Teo, the speaker in the video, talks about how he got into digital forensics using his degree in computer science. As he was always interested in computers, after college he started working as a security engineer and then transitioned to digital forensics. I appreciate how he mentions that his background in computer science has…
Category: Journal Entries
Journal Entry 9
After completing the Social Media Disorder Scale, I scored two out of nine, and accordingto DSM, scoring at least five out of nine meets the criteria for the formal diagnosis of“disordered social media user.” The scale asked reasonable questions, and It made methink once again about my social media as the question neglected other activities…
Journal Entry 10
After reading this article I understand that the need for the importance of social cybersecurity as it is quoted in the article “an emerging scientific area focused on the science to characterize, understand, and forecast cyber-mediated changes in human behavior, social, cultural, and political outcomes, and to build the cyber-infrastructure needed for society to persist…
Journal Entry 8
Based on watching the YouTube video, it displays just how much the media distorts cybersecurity and more importantly, hacking. Some projects have a hundred percent accuracy while others are only partially correct and throw in other jargon/ eDects to make the scenes seem cool. The media greatly influences things and controls how people perceive certain…
Journal Entry 7
Meme 1 : This relates to human-centered cybersecurity as it raises awareness about the potential threats we come across every day. By being more mindful of what we click we could avoid a lot of malware and phishing and that is what human centered cybersecurity emphasizes. Meme 2: Humans are the weakest link when it…
Journal Entry 4
Maslow’s Hierarchy of Needs states that “all humans have needs that exist on a hierarchy.” As we satisfy our lower-level needs, we begin to focus on meeting our upper- level needs. According to the hierarchy, the lowest level would be psychological needs. I use technology to fulfill this role by ordering groceries oE Instacart and…
Journal Entry 2
The principles of science relate to cybersecurity by playing major roles in understanding security challenges. Determinism is a principle of science that states behavior is caused or influenced by preceding events. In cybersecurity, this principle can relate to the predictability of a system’s behavior based on its weakness. According to determinism if you understand the…
Journal Entry 14
Reading this article informed me that people are committing illegal acts without even knowing, some maybe harmless while others aren’t. The most serious violation would be bullying and trolling. Bullying online can have serious implications as it can cause harm to the victim, verbal abuse is still abuse. Next would be sharing others personal information…
Journal Entry 13
Based on the article the bug bounty program is a solution for improving cybersecurity. They are a security measure for companies. The report mentions that the number of vulnerabilities found isn’t impacted significantly by the company size, bounty offered, or reputation, variables that would otherwise inflate the costs. Due to a trend of fewer reports…
Journal Entry 11
Cybersecurity Analysts are the first line of defense that monitors the network and responds to incidents. They play an important role in protecting our online privacy from threats. The main theme is the importance of digital security in our world. A theme that arises in the presentation is the high demand for cybersecurity analysts along…