The article that I am reviewing is titled A Taxonomy of Cyber-Harms Defining the Impacts of Cyber-Attack and Understanding How They Propagate. This article is adapted from the Journal of Cybersecurity. The principles of science that this article relates to are criminology, economics, and sociology. This article relates to the criminology aspects of this article…
Author: apope011
Career Paper: Digital Forensic Examiners
Introduction The field that I am writing about for this paper is digital forensics. I think this field is interesting because it implements two fields that I like learning about, which are cybersecurity and criminal justice. The components of a digital forensic examiner are fascinating because the field involves protecting digital information in cybercrime…
Journal Entry Fifteen
The video titled Digital Forensics | Davin Teo was interesting and informative about the careers of digital forensics investigators. I think the speaker’s pathway to a career as a digital forensics investigator is amazing. It was interesting to learn how the speaker’s original profession was accounting and later switched to the profession of digital forensics…
Journal Entry Fourteen
The article titled 11 Illegal Things You Knowingly Do On The Internet discusses a list of illegal things society does on the internet and goes into specific details about the components of this list. I think the five most serious violations are bullying and trolling, collecting information about children, using torrent services, sharing passwords, addresses,…
Journal Entry Thirteen
The article titled Hacking for Good: Leveraging Hacker One data point to develop an economic model of bug bounty was interesting. The article discussed using the bug bounty policy to identify technological vulnerabilities in an organization’s network. I think the use of this policy is good for organizations to implement to analyze the strength of…
Journal Entry Twelve
I think an economic theory that relates to the letter is the laissez-faire theory, which states that government officials should only intervene in a cybersecurity economic situation if it involves protecting individuals’ inalienable rights. The company had to report the incident to law enforcement. I also think that rational theory relates to the letter because…
Article Two Review
Article Review Two: The Stimulation of Human Response to Social Engineering Attacks Introduction The article that I am reviewing is titled Harnessing Large Language Models to SimulateRealistic Human Responses to Social Engineering Attacks: A Case Study. The article is adaptedfrom the International Journal of Cybersecurity Intelligence and Cybercrime. In this paper, I willdiscuss how the…
Journal Entry Eleven
The video titled What Does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook was interesting. I learned a lot of information about the description of a cybersecurity analyst. A few social themes Nicole discussed in the video are geographical regions and job descriptions of certain cybersecurity analysts. In the video, she discusses how the…
Journal Entry Ten
The article titled Social Cybersecurity: An Emerging National Security Requirement was informative. The article explains how social cybersecurity focuses on how the studies of human behavior are related to cyberthreats. I learned how social cybersecurity is complex due to the many attributes incorporated with this concept. The points the authors made in this article about…
Journal Entry Nine
The video titled How Cybercriminals Can Use Your Social Media Activity Against You was interesting. I do not have a social media disorder. Most of my answers to the questions on the scale were no. In questions four, five, and eight, I answered yes. I think the questions asked on the scale were important questions…