Davin Teo is a digital forensics investigator that has been doing the job for over 17 years. During the TED talk video, he explained that he got into digital forensics originally by chance. He is an accountant by profession and got into doing IT-related tasks at his accounting firm, from there in the early 2000s…
Author: ashie005
Career Paper: Digital Forensics
Digital forensics, according to Evans et al. (2011), is a branch of forensic science that was developed in response to a pressing need in the early 1990s. (p. 1). Although there may have been cybercrime occurring before the 1970s, there were no specific laws established against cybercrimes. (Upguard, n.d.). All cybercrimes committed at the time…
Journal Entry #12 – Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
The five most serious violations that I see from this list are: Sharing Passwords, Addresses, or Photos of Others, Faking your identity online, Collecting information about children, Illegal searches on the internet, and Recording a VoIP call without consent. Sharing Passwords, Addresses, or Photos of Others without their consent is serious because this practice can…
Journal Entry #11-2: write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
The use of a free-lance hacker via the bug bounty policy is a good policy to utilize in my opinion. Cybersecurity experts as good as they may be could use help at times. At the end of the day, the goal of the company is to protect its bottom line and prevent a financially costly…
Journal entry #11-1: Read the “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
In the sample letter from the www.glasswasherparts.com data breach, the rational choice theory, the classical economic theory, laissez-fare economic theory, and the marxian economic theory. With the Rational choice theory, the business makes the best choice in its best interest. In this sample letter, the breach went on from February 2016 to December 2016. The…
Article Review #2 – From information security to cyber security
Article Review: From information security to cyber security Solms, R. von, & Niekerk, J. van. (2013, April 29). From information security to cyber security. Computers & Security. Retrieved November 5, 2022, from https://www.sciencedirect.com/science/article/pii/S0167404813000801 The article, “From information security to cyber security”, by Rossouw von Solms and Johan van Niekerk focused on how information security and…
Journal Entry #10-2: Watch the video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
During the video, some of the social behaviors that will be required of an entry-level cybersecurity analyst will be being a team player, having technical and social skills, continuing to learn, and having communication skills. Being a team player involves being flexible and working together with others. This will require some interaction and the ability…
Journal Entry #10-1: Read and write a journal entry summarizing your response to the article on social cybersecurity
According to CASOS (2019), “Social-Cybersecurity is an emerging scientific area focused on the science to characterize, understand, and forecast changes in human behavior, social, cultural and political outcomes, and to build the cyber-infrastructure needed for society to persist in its essential character in a cyber mediated information environment under changing conditions and actual or imminent…
Journal Entry #9 – Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
After completing the Social Media Disorder scale, I scored a 0 out of 9. It is determined that if you answer Yes to 5 of the 9 questions asked, you are said to have a Social Media Disorder. This scale is catered mostly to teens and adolescents, but can still be relevant to adults as…
Journal Entry #8 – After watching the video, “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube”, write a journal entry about how you think the media influences our understanding about cybersecurity
I think that the media industry and the multiple platforms they occupy have a very influential impact not just in cybersecurity, but in general. From news outlets, big and silver screens, video games, to social media, these platforms have the ability to reach the most people in the shortest amount of time. In days before…