Davin started off at an accounting practice; he then went into IT but was still pursuing his accounting profession. He then got the opportunity to work in the first national digital forensic practice in Australia, then London, and now Hong Kong. In the video, he talks about the common misperceptions people have of digital forensics….
Category: Cyse 201S Journals
Journal #14
After reading through the violations that people do unknowingly online, one of the five most serious violations is sharing passwords, addresses, or photos of others. To me, I think that this one can be really tricky. There are a lot of times where people will ask others for someones address so they can give them…
Journal #13
In this sample breach letter, one way there the classical economic theory is evident is because the customer’s credit card and payment information, such as first and last name, their address, and phone number, was given to the website. The hacker found this information and was buying things with their information. Since customers help with…
Journal #12
The description of a cybersecurity analyst’s job relates to social behaviors because a big part of their job is to find vulnerabilities and try to think how other humans think when they are trying to attack a company, website, etc. They also try to provide guidance and training for user awareness. Doing this will be…
Journal #11
In the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties”, the findings that were provided were very interesting. One finding that mentioned is that “hacker supply is price inelastic”. It talks about how a lot of hackers are motivated by things that don’t contain money, such as getting…
Journal #10
After reading the article “Social Cybersecurity: An Emerging National Security Requirement,” I was able to recognize that social cybersecurity can be a really good and bad thing. The definition of social cybersecurity is “ an emerging scientific area focused on the science to characterize, understand, and forecast cyber-mediated changes in human behavior, social, cultural, and…
Journal #9
After completing the social media disorder scale, I scored a five. I think the items in the scale are pretty accurate in what the scale is trying to achieve. I think some questions were a little intense such as thinking about nothing else but social media. I also think I think that, though, because I…
Journal #8
After watching the video, the media influences how people think about cybersecurity, such as using random terms such as “omega site,” which is not a real thing, casting it in front of everyone instead of doing it in a private office. They also just show things that aren’t a part of cybersecurity, such as the…
Journal #6
Three fake websites I found were Wikipedia, web md, and Babytree.com. Three real websites are google scholar, the new york times, and Ted.com. Wikipedia has access to where anyone can go in and add or delete information. It is not a trustworthy website because of that. Web Md is also similar to Wikipedia because it…