Journal Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. I genuinely think it is very interesting and cool about how he got…

Journal Entry #14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The eleven things Internet users do are: Out of these 11 offenses, the five most serious violations are sharing…

Journal Entry #13

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Two economic theories: Rational Choices, and Classical Economic theory Two social sciences theories: Structural functionalism, Symbolic Interactionism This sample breach letter is explaining how customers of Glasswasherparts had…

Journey Entry #12

Bug Bounty Policies A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the…

Journal Entry #11

Watch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation.CYSE201S 32 One thing that Nicole Enesse discussed was that a Cybersecurity Analyst will need to do many different jobs and be able to talk with…

Journal Entry #10

Read this and write a journal entry summarizing your response to thearticle on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ Cybersecurity has always been described to me as more of a people issue more than a computer issue. The machines that we use every day can only find true and false states based off of what we as the…

Journal Entry #9

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? For each of the 9 statements below, simply answer yes or no. During the past year, have you … How many yes’s? 7 5 or…

Journal Entry #8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. I believe that media attempts to use some assets from real cybersecurity work to make it appear more realistic, but Hollywood prefers to overdramatize things in order to keep the attention of the audience. As I…

Journal #7

• Review the following ten photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s). • https://unsplash.com/photos/mfB1B1s4sMc• https://unsplash.com/photos/gySMaocSdqs• https://unsplash.com/photos/ICTKcvnXx_8• https://unsplash.com/photos/Z3ownETsdNQ• https://unsplash.com/photos/5QgIuuBxKwM• https://unsplash.com/photos/R6dSBkz32B8• https://unsplash.com/photos/BXiLSwwvqrY• https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg• https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg• https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg • Explain how your memes relate to Human Systems Integration.

Journal #6

Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? -rnicrosoft.com -howtogeeek.com -gogle.com All of these domains are very close to the original name, but they either look very close but aren’t the actual domain, or they are a domain that could accidentally…