The career of digital forensics investigators relates to social sciences in severalimportant ways, because their work doesn’t just involve analyzing data and technology;it also requires understanding human behavior, motivation, and societal context. Themost significant aspect, in my opinion, is that investigators often rely on psychologicaltheories to interpret digital evidence and help profile cybercriminals, which aids…
Author: bgran005
Module 12 Journal
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a journal entry. In this article the author outlines eleven online activities that people do online that theymight not know is illegal. Same of these things include torrenting/pirated media,cyberbullying, stealing someone’s identity, and illegal searches,…
Module 8 Journal
Watch these videos and pay attention to the way that movies distort hackers. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. Has this understanding changed over time? What is different in the older pieces of media vs. more current media? After watching the videos…
Module 6 Journal
https://www.youtube.com/watch?app=desktop&v=6BqpU4V0YpkWe have many misconceptions about cybersecurity. Here, hackers tell you about some of our misconceptions. What personal misconceptions did you have before you started to study cybersecurity? Have those been proven right or wrong? As I watched the video on common misconceptions in cybersecurity, it reminded me of when I watched movies about hacking as…
Module 5 Journal
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 1. Multiple Reasons—To me, this motive makes the most sense becausecybercriminals…
Module 4 Journal
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs is a psychological theory that outlines five levels of humanneeds, from basic survival to self-actualization. The first level consists of physiologicalneeds,…
Module 3 Journal
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? What branch or branches of social science do you think would benefit the most from a site hosting this information? Researchers can utilize this site as a comprehensive resource to study data breaches from acrossthe…
Module 2 Journal
Define each of the principles of science in your own words. Then, give an exampleof how each of the principles relates to cybersecurity. RelativismThe principle of relativism in philosophy says that truth or moral values are not definitive. It alldepends on the context, culture, or perspective. In relation to cybersecurity this means thatpolicies, risk decisions,…
Discussion Board: From Verbeek’s writing, Designing the Public Sphere: Information Technologies and the Politics of Mediation
How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world? With the diminishment of state power and the increasing connectivity and intelligence of our world, traditional regulatory methods, primarily restrictive, state-driven approaches, aren’t sufficient for…
Discussion Board: The NIST Cybersecurity Framework
From your readings of pages 1 – 21 of the NIST Cybersecurity Framework, what benefit can organizations gain from using this framework, and how would you use it at your future workplace? Organizations can use this framework as a supplement to their own to help them improve risk management by identifying, assessing, and managing cyber…