Journal Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. I genuinely think it is very interesting and cool about how he got to his career. He only worked in accounting, a very ‘non-technological’ job. Then through a job opening...

Read More

Journal Entry #14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The eleven things Internet users do are: Use unofficial streaming services. Use Torrent services. Use Copyright images. Share others’ passwords, photos, and addresses. Bullying/Trolling Recording a call over the...

Read More

Journal Entry #13

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Two economic theories: Rational Choices, and Classical Economic theory Two social sciences theories: Structural functionalism, Symbolic Interactionism This sample breach letter is explaining how customers...

Read More

Journey Entry #12

Bug Bounty Policies A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies...

Read More

Journal Entry #11

Watch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation.CYSE201S 32 One thing that Nicole Enesse discussed was that a Cybersecurity Analyst will need to do many different jobs and be able to talk with many different types of people, especially if it is...

Read More

Journal Entry #10

Read this and write a journal entry summarizing your response to thearticle on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ Cybersecurity has always been described to me as more of a people issue more than a computer issue. The machines that we use every day can only find true and false states based off of what we as the user tells them and cannot make...

Read More

Journal Entry #9

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? For each of the 9 statements below, simply answer yes or no. During the past year, have you … … regularly found that you can’t think of anything else but the moment that you will be able to use social media again? yes … regularly felt dissatisfied...

Read More

Journal Entry #8

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. I believe that media attempts to use some assets from real cybersecurity work to make it appear more realistic, but Hollywood prefers to overdramatize things in order to keep the attention of the audience. As I have heard many times throughout my life, “the best lies start with a grain of truth”. The grains...

Read More

Journal #7

• Review the following ten photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s). • https://unsplash.com/photos/mfB1B1s4sMc• https://unsplash.com/photos/gySMaocSdqs• https://unsplash.com/photos/ICTKcvnXx_8• https://unsplash.com/photos/Z3ownETsdNQ• https://unsplash.com/photos/5QgIuuBxKwM• https://unsplash.com/photos/R6dSBkz32B8•...

Read More

Journal #6

Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? -rnicrosoft.com -howtogeeek.com -gogle.com All of these domains are very close to the original name, but they either look very close but aren’t the actual domain, or they are a domain that could accidentally be reached by a user hurriedly rushing to type in a URL. The best way to prevent this is to...

Read More