Article Review #2

Article Review #2 How can be assess the effectiveness of the cybersecurity awareness program? How topic relates to principles of social science This topic relates to principles of social science because cybersecurity awareness falls into line of the social part of cybersecurity. Awareness of cybersecurity is not a stagnant thing that people don’t just learn…

Article Review #1 Alexander Conrad

Alexander Conrad Spring CYSE201S 02/11/2024 Article Review #1:  Of Factors Effecting Cyber Incident Occurrence: Mediating Role of Cyber Incident Reporting Mechanism BLUF Cybersecurity is a huge factor that is very important for organizations because of the security it brings them to keep their data safe. This article goes over the different factors that affect the…

Week 15 – Journal Entry 15

Alexander Conrad CYSE201S 04/20/2024 Week 15 – Journal Entry 15 Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. After watching the video, the speaker’s pathway to his career is an…

Career Paper

Alexander ConradCYSE 201S04/07/2024IntroCareer PaperCybersecurity is the general umbrella term of a multitude of different jobs and careersthat specialize in different disciplines and ideas that are more specific than just the description ofthe term. Cybersecurity as a term is to protect networks, devices, and data from any unauthorizedpersonnel. With the unending advancement of technology and inevitably…

Week 13 Journal Entry 14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious After reading the article written by Andriy Slynchuk about what internet users do that may be illegal, the five…

Week 12 Journal Entry 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…

Week 12 Journal Entry 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. After reading the sample data breach notification letter, different economic theories and social science theories came to mind that relates to the letter. For…

Week 11 Journal Entry 11

Watch this video and think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. Social themes that I noticed arise in the presentation were about what the cybersecurity analyst job actually does, because it works with both the security of…

Week 11 Journal Entry 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. After reading the article on social cybersecurity I find it very interesting how they talk about cybersecurity attacks and how they are evolving. As they talked about in the article, cybersecurity attacks in the…

Week 10 Journal Entry

Complete the Social Media Disorder scale. How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world? On the Social Media Disorder scale, I scored a 1 out of 9 which does not put me in the criteria to have…