Anthony Thompson Professor Diwakar Yalpi CYSE201S November 29th 2023 Career Paper Cybersecurity is a burgeoning field that is expected to play a major role in society over the coming decade. As advancements in technology accelerate, so does the need to protect the systems that rely on them. While some may view the field as strictly…
CYSE 201S Entry 15
Reaction to Ted Talk on Digital Forensics, Commentary on His Career Path. This speech describes his career as having been a transition from working at an accounting firm, to becoming a digital forensics investigator. He explains that at the time, there wasn’t a traditional career path into digital forensics. People tended to find their way…
CYSE 201S Entry 14
5 most serious of the illegal behaviors online people aren’t aware of.
CYSE 201S Entry 13
Response to article about Bug Bounty Programs. This article describes a study into the economic viability of Bug Bounty Programs. Bug Bounty Programs pay individuals to conduct penetration testing services for companies. Rather than hiring out a large firm on a long term contract, these programs give companies access to individual hackers on a short…
CYSE 201S Entry 12
Describe how two different economic and social theories relate to a data breach notification. Keynesian Economic Theory relates to the data breach notification in that a notification like this could prompt significant changes in consumer behavior. The breach could scare consumers and might require government intervention. Classical Economic Theory tends to suggest that “the market”…
CYSE 201S Entry 11
Cybersecurity analyst positions as they relate to social behaviors. Response to a provided video. One way the provided video relates to social behaviors is the guidance and training she references. This can be filed under the “teamwork” category as these are tasks that serve the whole, rather than the individual. Because this training is often…
CYSE 201S Entry 10
Response to “Social Cybersecurity: An Emerging National Security Requirement.” This article offered a fascinating exploration of the developing national security challenges presented by social media technologies. We tend to think of these platforms as ways to interact with one another online. However, governments have been dealing with an entirely different problem: Information Warfare. The internet’s…
Article Review 2
Anthony Thompson Professor Diwakar Yalpi CYSE201S November 2nd, 2023 “Simulation for cybersecurity: state of the art and future directions” Journal of Cybersecurity By Hamdi Kavak, Jose Padilla, Daniele Vernon-Bido, Saikou Diallo, Ross Gore, Sachin Shetty March 2021 Introduction This focus of this article is simulation technologies and their application and importance to the field of…
CYSE 201S Entry 9
Social Media Disorder Scale We were asked to measure our own social media use according to the DSM’s criteria for disordered social media use. There are 9 questions and if 5 of them are met you can qualify for a social media disorder diagnosis. Currently, I meet 3 of the 9 criteria. I often neglect…
CYSE 201S Entry 8
Response to analysis of Hollywood hacking scenes We were required to watch a video where a professional hacker reviews famous hacking scenes from movies. Throughout the video a few things are clear. Firstly, there is a wide range of quality and realism. Some of the scenes use real world exploits, and even show actual programs…