Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. After I watch the TEDx talk about the digital forensics investigator career by…
Author: achon001
Module 14 Journal 1
Complete the Patchin and Hinduja’s cyber bullying survey. After completing the survey, discuss how you think criminologists might use the surveys to explore relationships between the different items. After I complete Patchin and Hinduja’s cyberbullying survey that asks you more than 30 questions about your cyber bully experience and behavior in the last 30 days….
Module 12 Journal
Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. After I read and study the article about eleven things Internet users do that may be illegal by Andriy Slynchuk, it makes me recognize how some violation activities in cyberspace or the…
Module 11 Journal 3
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. After I read this article, I found it is an article about a data breach that www.glasswasherparts.com was hacked by a hacker. The hacker uses the malware on…
Module 11 Journal 2
Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. After I study and read the Bug bounty policy article, it makes me know many things about bug bounty policies that it is a policy…
Module 11 Journal 1
Read the three case studies and identify at least one thing each company could have done to reduce the risk of experiencing cybersecurity incidents. Also, explain whether doing a risk assessment ahead of time would have helped each company. For the 3 cybersecurity incident cases, I decide to study viz 1. Yahoo data breach…
Cybersecurity Career Professional Paper
For the cybersecurity career professional paper, I want to present about the digital forensic investigator career, one of many careers in the Workforce Framework for Cybersecurity (NICE Framework). (NICE Framework, 2022) First, we need to know the definition of digital forensics for making us more understand this career. Digital forensics is the process of science…
Module 10 Journal 2
Read this and write a journal entry summarizing your response to the article on social cybersecurity After I read the article about social cybersecurity provided by the class, it makes me see and agree with how significant social cybersecurity is and how warfare and cybersecurity changed from the past. In the twentieth century, the…
Module 10 Journal 1
Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. After I am watching the video about the cybersecurity analyst career that the class provides, it makes me clearly see and understand how a cybersecurity career relates to or requires…
Article Review 2
Article Review: The Effects of Self-control on the Cyber Victim-Offender Overlap After I read this article, I found it is cybersecurity research that relates to criminology and found many things in the research related to the principle of social science. For example, it relates to the principle of relativism which means that all things…