I was astounded by how closely this profession relates to the social sciences after seeing Davin Teo’s TEDx lecture on digital forensics. Fundamentally, digital forensics is more than simply technology; it’s also about comprehending human motives, behavior, and the social dynamics that surround cybercrime. Teo’s professional path emphasizes the need for both technological know-how and…
Category: Journal Entries CYSE201S
Welcome to my Journal Entries! This section documents my reflections, insights, and progress throughout my academic journey. Here, I explore key topics, challenges, and breakthroughs related to my interdisciplinary research in cybersecurity and ethics, as well as other coursework experiences.
Journal Entry 14
“11 Illegal Things You Unknowingly Do on the Internet” identifies a number of behaviors that many internet users might not be aware are illegal. Accessing pirated content via unapproved streaming services and downloading copyrighted content via torrent services are two of the most severe infractions. These acts cause large financial losses by violating copyright rules…
Journal Entry 13
According to the article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties,” bug bounty schemes assist businesses in locating cybersecurity flaws. Companies that do not have the funds to hire full-time cybersecurity experts might profit from bug bounties, which encourage independent security researchers to test systems. The literature study…
Journal Entry 12
Important social science and economic ideas are reflected in Glasswasherparts.com’s “Sample Data Breach Notification” letter. Customers are left exposed since the corporation was aware of the incident before alerting them, resulting in information asymmetry. The business closes this gap by alerting clients, enabling them to take preventative measures. The externalities argument is also applicable since…
Journal Entry 11
The function of a cybersecurity analyst, which closely relates to my professional objectives, is explained in the film “What does a Cybersecurity Analyst Do?” It highlights the intimate relationship between social behaviors and technical abilities in protecting digital environments. On the front lines of digital defense, cybersecurity experts concentrate on both technology safeguards and human…
Journal Entry 10
The article, “Social Cybersecurity: An Emerging National Security Requirement” explores the vital role that social cybersecurity plays in the current environment, where information warfare aims to undermine social cohesiveness and trust. Social cybersecurity seeks to protect society against “cognitive hacking,” in contrast to traditional cybersecurity, which is concerned with safeguarding information systems. In order to…
Journal Entry 9
After watching the cybersecurity and social media video and taking the Social Media Disorder scale, I discovered that my score helped me understand how I relate to social media. The items on the scale address a range of habits, such as obsessively monitoring social media, experiencing anxiety while not using it, or putting off other…
Journal Entry 8
Hacking is frequently exaggerated in films and television programs, which portray it as a simple, thrilling process in which hackers can easily breach networks. The public’s perception of cybersecurity is distorted by this representation. Unlike the glamorous, quick success shown on TV, hacking is actually far more complicated and requires specialized equipment, patience, and in-depth…
Journal Entry 6
Here’s a comparison of three fake websites i made up and their real counterparts, highlighting what makes the fake sites stand out as fraudulent: What Makes Fake Websites Fake: Fake websites often have misspelled domains, unusual domain endings (like .info or .net), and lack SSL encryption (no padlock symbol or HTTPS in the address bar)….