Week 12 #14: Andriy Links Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Out of the eleven actions that Slynchuk covered that may be illegal, the five most serious violations in my opinion are using unofficial streaming services, sharing copyrighted photos, bullying and trolling, using the internet of others, and faking your identity online. The internet is a vast place, and people can use it to their advantage…
Week 11 #13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true
Week 11 #12: Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
From the contents of the sample data breach letter, the business expressed the incident of a security breach on their website as a result of mishandling by their third party platform provider who experienced the intrusion. From my perspective, this data breach of www.glasswasherparts.com is a result of the business failing to make a rational…
Week 10 #11: As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
In the presentation, Cybersecurity professional Nicole Enesse speaks on the nature of the Cybersecurity Analyst profession and its salary, skills, and job outlook. She mentions providing guidance and training for user awareness, which relates to the communications aspect of social behaviors. Cybersecurity Analysts might have to communicate such technical information regarding cybersecurity to people with…
Week 10 #10: Read this and write a journal entry summarizing your response to the article on social cybersecurity
I agree that social cybersecurity is undeniably a necessary national security requirement that those may overlook compared to physical security. It is important to recognize that at the root of warfare is information “used to strengthen your narrative while attacking, disrupting, distorting, and dividing the society, culture, and values of other competing states and organizations”…
Week 9: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I scored a 3/9 on the Social Media Disorder scale, which was actually better than I thought I would score. As a college student now in my 20s, my generation is very prone to social media use. I think that the items on the scale are very extreme and could definitely be indicative of some…
Week 8: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
Due to the large amounts of media consumed by us every day through the internet and technology, we as a society are more easily influenced by such media. Since the realm of technology and computers may be less understood by most people with a lack of knowledge on the terms, it can be easy to…
Week 7: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs Innocent victim has no idea that the clothes advertisement email they just opened was actually a phishing attack and now their credit card information has been compromised. This meme is related to human-centered cybersecurity because it places human error at the cause of their vulnerability. https://unsplash.com/photos/black-smartphone-near-person-5QgIuuBxKwM Me when my phone won’t stop ringing with…
Week 6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
The first website I looked at is a copycat of the PayPal payment service website called PayPail. The fake website imitates the official PayPal login screen in order to prompt users to enter their login information. Since this website is imitating an already well known company and is targeting members of that service, these targets…