The Interplay of Cybersecurity Analysts and Social Science In the ever-evolving landscape of cybersecurity, the role of cybersecurity analysts is pivotal in safeguarding digital assets and ensuring the integrity of information systems. While technical expertise is essential, a comprehensive understanding of human behavior, societal structures, and the dynamics of marginalized groups is equally crucial for…
Author: bnanc001
Article Review #2
Ransomware Payments in the Bitcoin Ecosystem: A Critical Analysis Introduction:Ransomware attacks have become increasingly prevalent in recent years, targeting individuals, businesses, and even government institutions. One alarming aspect of these attacks is the use of cryptocurrency, particularly Bitcoin, as the preferred mode of payment by cybercriminals. This article aims to critically review the dynamics of…
Article Review #1
Cyberbullying and Psychological Stress Among Female Employees: A Critical Review Introduction Cyberbullying has become more and more invasive in the everyday lives of our youth. With the influx of social media sites, we are seeing a massive increase of cyberbullying. This article review goes into a study that talks about the impact of cyberbullying on…
How Digital Forensics Investigators Relate to Social Sciences
It was surprising to learn that when the speaker commenced his career in digital forensics, there were no available classes or courses dedicated to the field. Initially an accountant, he found the allure of IT appealing due to his interest in tinkering with computers. This led to his introduction to IT-related roles, eventually securing a…
11 Illegal Things You Unknowingly Do Online
Andriy Slynchuk goes over 11 different things many users do or may have done that is illegal. Of the 11 listed, I feel that 11,9,7,6, and 5 are the worst ones of the list. 11 is illegal searches on the internet. I would say this is the worst one on the list due to the…
Breach Case Study Relating To Economic And Social Science Theories
https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Read the letter above to gain context to this journal entry One economic theory that relates to this letter is game theory. Game theory involves analyzing strategic interactions between rational decision-makers. In this context, the interaction involves the platform provider, the customers, and the attackers. The delayed notification to customers, as mentioned in the…
Social Cybersecurity: An Emerging National Security Requirement
As the world has become more and more interconnected, the risk of cyber attack becomes more of a threat. Technology has become so advanced that wars or no longer just a battle of on ground tactics. It has turned to a battle in cyber on top of the ground tactics. And with the advancement in…
Social Media Disorder Scale
I took the social media disorder scale and scored a 3.0. A score of 5.0 or above indicates a formal diagnosis of a disordered social media user. I think that their are different patterns around the world due to different lifestyles and the sort of broad questions on the scale. I think if the scale…
Hacking Movies – Are They Real?
In media, hackers are depicted as these geniuses that can read code and exploit vulnerabilities within minutes. In real life however it could take hours or days to be able to go through all the code and find the right vulnerabilities to exploit. I think this sort of depiction is bad for the public as…
Meme Relating to Human Systems Integration
This photo relates to human systems integration because it shows the importance of never logging into public Wi-Fi. Just logging into public Wi-Fi is enough for an attacker to get ahold of your information. This meme is a light hearted way to show how people will log into any free Wi-Fi that pops up, even…