I was astounded by how closely this profession relates to the social sciences after seeing Davin Teo’s TEDx lecture on digital forensics. Fundamentally, digital forensics is more than simply technology; it’s also about comprehending human motives, behavior, and the social dynamics that surround cybercrime. Teo’s professional path emphasizes the need for both technological know-how and…
Author: amcle015
The Role of Social Science in the Career of a Security Analyst
Introduction Protecting enterprises from online threats is the responsibility of a security analyst. This position blends technical expertise with a deep comprehension of human behavior. Social science concepts, which investigate human behavior, interaction, and social trends, are essential for security analysts to predict risks, inform users, and create inclusive, ethical tactics. With an emphasis on comprehending…
Journal Entry 14
“11 Illegal Things You Unknowingly Do on the Internet” identifies a number of behaviors that many internet users might not be aware are illegal. Accessing pirated content via unapproved streaming services and downloading copyrighted content via torrent services are two of the most severe infractions. These acts cause large financial losses by violating copyright rules…
Journal Entry 13
According to the article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties,” bug bounty schemes assist businesses in locating cybersecurity flaws. Companies that do not have the funds to hire full-time cybersecurity experts might profit from bug bounties, which encourage independent security researchers to test systems. The literature study…
Journal Entry 12
Important social science and economic ideas are reflected in Glasswasherparts.com’s “Sample Data Breach Notification” letter. Customers are left exposed since the corporation was aware of the incident before alerting them, resulting in information asymmetry. The business closes this gap by alerting clients, enabling them to take preventative measures. The externalities argument is also applicable since…
Article Review 2
Article Analysis: The Social Sciences Perspective on Electronic Contracts in Civil and Commercial Law Introduction In-depth analysis of electronic contracts under Jordanian law is given in the article “The Electronic Contract in Civil and Commercial Codes,” which also examines their drafting, special features, and legal ramifications in the civil and commercial spheres. Al Masadeh et…
Journal Entry 11
The function of a cybersecurity analyst, which closely relates to my professional objectives, is explained in the film “What does a Cybersecurity Analyst Do?” It highlights the intimate relationship between social behaviors and technical abilities in protecting digital environments. On the front lines of digital defense, cybersecurity experts concentrate on both technology safeguards and human…
Journal Entry 10
The article, “Social Cybersecurity: An Emerging National Security Requirement” explores the vital role that social cybersecurity plays in the current environment, where information warfare aims to undermine social cohesiveness and trust. Social cybersecurity seeks to protect society against “cognitive hacking,” in contrast to traditional cybersecurity, which is concerned with safeguarding information systems. In order to…
Journal Entry 9
After watching the cybersecurity and social media video and taking the Social Media Disorder scale, I discovered that my score helped me understand how I relate to social media. The items on the scale address a range of habits, such as obsessively monitoring social media, experiencing anxiety while not using it, or putting off other…
Journal Entry 8
Hacking is frequently exaggerated in films and television programs, which portray it as a simple, thrilling process in which hackers can easily breach networks. The public’s perception of cybersecurity is distorted by this representation. Unlike the glamorous, quick success shown on TV, hacking is actually far more complicated and requires specialized equipment, patience, and in-depth…