Week 12 #14: Andriy Links Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Out of the eleven actions that Slynchuk covered that may be illegal, the five most serious violations in my opinion are using unofficial streaming services, sharing copyrighted photos, bullying and trolling, using the internet of others, and faking your identity online. The internet is a vast place, and people can use it to their advantage…

Week 11 #13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.  The policies relate to economics in that they are based on cost/benefits principles.  Read this article and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true

Week 11 #12: Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

From the contents of the sample data breach letter, the business expressed the incident of a security breach on their website as a result of mishandling by their third party platform provider who experienced the intrusion. From my perspective, this data breach of www.glasswasherparts.com is a result of the business failing to make a rational…

Week 10 #11: As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.

In the presentation, Cybersecurity professional Nicole Enesse speaks on the nature of the Cybersecurity Analyst profession and its salary, skills, and job outlook. She mentions providing guidance and training for user awareness, which relates to the communications aspect of social behaviors. Cybersecurity Analysts might have to communicate such technical information regarding cybersecurity to people with…

Week 10 #10: Read this and write a journal entry summarizing your response to the article on social cybersecurity

I agree that social cybersecurity is undeniably a necessary national security requirement that those may overlook compared to physical security. It is important to recognize that at the root of warfare is information “used to strengthen your narrative while attacking, disrupting, distorting, and dividing the society, culture, and values of other competing states and organizations”…

Week 7: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs Innocent victim has no idea that the clothes advertisement email they just opened was actually a phishing attack and now their credit card information has been compromised. This meme is related to human-centered cybersecurity because it places human error at the cause of their vulnerability. https://unsplash.com/photos/black-smartphone-near-person-5QgIuuBxKwM Me when my phone won’t stop ringing with…