Journal Entry: Pathway to a Career in Digital Forensics

Davin Teo’s background as an accountant has likely helped him in his digital forensics career. His accounting experience gives him an advantage when working with financial institutions, as he has a better idea of what to look for than someone with no background in finance. His description of being “put into” digital forensics work seems…

Journal Entry: Illegal Internet Activity

Andriy Slynchuk described eleven things Internet users do that they may not realize are illegal: using unofficial streaming services, using torrent services, using copyrighted images, sharing passwords, addresses, or photos of others, bullying and trolling, recording a VoIP call without consent, faking your identity online, using other people’s internet networks, collecting information about children, extracting…

Journal Entry: The Relation between Economics and Bug Bounty Policies

Bug bounty policies seem to be a cost-effective way for organizations to identify and address vulnerabilities in their networks. As noted in the research study, organizations can fund a bug bounty program for less than the cost of two full-time software engineers. Bug bounty programs incentivize ethical hackers to report observed vulnerabilities to the impacted…

Journal Entry: Economic Theories & Social Science Principles related to Data Breach Notifications

The Marxian and laissez-faire economic theories relate to the sample data breach notification letter. Marxian economic theory relates to the letter because the attackers, those with power due to their technological skills, have exploited the platform provider, which has less technological prowess. Laissez-faire economic theory relates to the article because the platform provider reported the…

Journal Entry: Social Themes in Cybersecurity Analyst Roles

Throughout the video, one of the primary themes is that there are many different roles a cybersecurity analyst can hold. This demonstrates that it is important to be flexible and possess many of the social behaviors expected of cybersecurity professionals, as different ones may be emphasized in different roles. The cybersecurity analyst job description provided…

Journal Entry: Social Cybersecurity

After reading the article Social Cybersecurity: An Emerging National Security Requirement, I have a clearer understanding of how the United States Army is treating the changing landscape of cybersecurity. As cyberspace’s role in military conflict grows, it is increasingly important to understand how bad actors can spread information using technology to manipulate their targets into…

Journal Entry: The Social Media Disorder Scale

I scored two out of nine on the Social Media Disorder (SMD) scale, which does not qualify me for the formal diagnosis of “disordered social media user.” This scale is a good measure of an individual’s relationship with social media; the questions cover a broad spectrum of emotions in a relatively short survey, reducing the…

Journal Entry: How Media Influences Cybersecurity

The media influences our understanding of cybersecurity by portraying hacking as a very quick and easy task to accomplish. In many of the scenes shown in this video, the hacker is portrayed as gaining access to the target system in a very short amount of time. For example, in Oceans 8, there is a scene…

Journal Entry: The Importance of a Human-Centered Approach to Cybersecurity

I created this series of memes to explain the stages of attending mandatory cybersecurity training at your workplace. In the beginning, you do not yet understand the idea of human-centered cybersecurity and believe that cybersecurity is the responsibility of the IT department. As the training continues, you start to understand the importance of reducing human-related…

Journal Entry: Fake vs. Real Websites

This journal entry highlights the differences between fake and real websites. Below is an analysis of Amazon, Facebook, and Google phishing websites. The right screenshot is from the official Amazon website, while the left one was from a White Oak Security blog post about an Amazon phishing email. As highlighted in the images, differences include…