Week 15 – Journal Entry 15

Davin Teo started a sales accountant practice. The company also wanted their accountant to know a little about IT management. He joined a new team that started in digital forensics and has stuck with it forever since. He continued in the profession for 17 years, changing his profession to what he deemed most comfortable for…

Article review #2

APT Detection throughIntroductionThe field of cybersecurity is always evolving, and that’s not always a good thing. Specificallywhen it comes to Advanced Persistent Threats (APTs), there seem to be endless ways aroundthe technology we have today. These schemes are made to trick traditional security systems, sonew detection techniques must be developed. In this review, we’ll go…

Article review #1

Article #1 Reviewing Cyber JournalsVictimization by Deepfake in the Metaverse: Building a PracticalManagement FrameworkThis study has its roots in the laws of social science and explores the complications betweentechnology, human behaviors and society’s aftereffects. This research integrates criminologicaltheories with analysis of routine activities theory, Eysenck’s criminology theory and insightsfrom the metaverse in exploring the link…

Career Paper

In order to become a Cybersecurity manager, you must fit the criteria. Requirements include proven experience as an information security manager or similar role, experience with security frameworks, solid understanding of security technologies and controls (firewalls, encryption, access control, etc.), excellent communication and interpersonal skills, strong project management and organizational abilities. Knowing how social science…

Week 13 – Journal Entry 14

The five most serious violations are Sharing Passwords, Addresses, or Photos of Others, Bullying and Trolling, Collecting Information About People Younger Than 13, Faking Your Identity Online, and Recording a VoIP Call Without Consent. These offenses go beyond just stealing copyright information; these violations can change the lives of others for the worse. Sharing passwords,…

Week 12 – Journal Entry 13

This journal combines a literature review on all of the material and talks about bug bounty programs Cybersecurity. However, beyond the pragmatic and theoretical explanations of bug bounties, there is also empirical evidence backing up their utility. This challenges the common belief that hackers only look at prices discuss issues like the impact of these…

Week 12 – Journal Entry 12

Information asymmetry, market failure due to externalities and other economic theories come into play when customers who are ignorant of vulnerabilities in the platform provider’s systems may have their data put at risk thereby showing information gap and market inefficiency that lead to costs being imposed on individuals rather than those responsible. These dynamics can…

Week 11 – Journal Entry 11

Cyber Analyst are the first line of defense when it comes to monitoring the network or responding to incidences and requires 24/7 availability for graveyard shifts. This field is high in demand and low in competition. You can work anywhere as a Cybersecurity analyst. There is high pay but that involves high cost of living….

Week 11 – Journal Entry 10

To summarize emerging as part of our national security, social cybersecurity toys with understanding and predicting human behavior. The intention is to grasp better how changes in society will occur from the internet. Deeply strategic, it targets beliefs and ideas through technology. Information warfare has evolved into an independent conflict form. Actors use it to…

Week 10 – Journal Entry

My score was a three out nine.  I believe more depth should be added to the questions along with more than just nine questions for a better understanding of one’s usage. I think that different patterns are found across the world due to the different cultures and situations in which countries, states, cities, and communities…