Write a journal entry describing what you think about the speaker’s pathway to his career in Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube. In the video, Davin Teo began in a small accounting field. This shows that people can transition into Digital Forensics from diverse backgrounds, showcasing the nature of the field. He…
Category: CYSE201S Journals
Journal entry 14
Review what Andriy Slynchuk says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Using unofficial streaming services, utilizing torrent services, using copyrighted images without permission, sharing personal information such as passwords, addresses, or photos of others without consent, and engaging in bullying and trolling are…
Journal entry 13
Sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Economic Theories: Game Theory: Relevance to the Breach Letter: Game theory can be applied to understand the strategic interactions between the company, affected individuals, and potential perpetrators. The company’s response and…
Journal entry 12 – Bug Bounty Policies
Write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. The article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” provides a valuable contribution to the understanding of bug bounty programs by synthesizing insights…
Journal entry 11 – Case Study
Read the article “Social Cybersecurity An Emerging National Security” and write a journal entry summarizing your response to the article on social cybersecurity. In response to the article “Social Cybersecurity: An Emerging National Security Requirement,” I found exploring the intersection of cybersecurity and national security interesting. The article effectively highlighted the nature of cyber threats,…
Journal entry 10
Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. The job description for a cybersecurity analyst is fundamentally linked to different social behaviors, which reflects the dynamic changes that occur between people and the digital environment. The increasing significance…
Journal entry 9
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? On the Social Media Disorder scale, I scored a 3-5 (Yes: 3 times and No: 5 times). The items in the scale reflect…
Journal entry 8
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. By watching the video “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” on YouTube. The experience left me wondering about the impact that media has on creating our perceptions and…
Journal entry 7 – Cybersecurity Memes
Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration. Meme Title: “The Human Systems Integration Rollercoaster” Image Description: Caption: “When you’re trying to integrate all the aspects of your mind like…” Connection to Human Systems Integration (HSI) Explanation: In Human Systems…
Journal entry 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake Websites: Real Websites: