The speakers pathway into digital forensics was mainly from connections. First, he was an accountant, while he was at his accounting firm they needed a technology expert to help out with some of the devices. He was willing to take up the extra job. While he was working both jobs he ended up falling in…
Journal #14
The five violations people do without knowing they are illegal that I believe are the most serious are collecting information about children, sharing passwords, addresses, and photos of others, bullying and trolling, using other people’s internet networks, and lastly Using unofficial streaming services. I chose these five because they have the most potential for serious…
Journal #13
The article is focused on bug bounty programs. Bug bounty programs pay people for identifying vulnerabilities in a company’s network or physical security network. The article found for the first time the elasticity of hacker supply, which was between 0.1 and 0.2. This means that hackers who are willing to do the program are mostly…
Journal #12
The two economic theories that relate to this security breach letter are the rational choice and Laissez-faire economic theory. Rational choice is the business’s ability to make choices in its best interest. This relates to the article by showing how the company hired the “leading cybersecurity firm” to remove the malware from its systems so…
Journal #11
Cybersecurity is an extremely social field. The video brought up that networking is a huge part of looking for and securing a cybersecurity job. Networking is so important in getting a cyber job because of the amount of people applying. If you already have an in then it will be easier for the company to…
Journal #10
I believe that the article “Social Cybersecurity An Emerging National Security Requirement” is a very informative article about the relatively new concept of social cybersecurity. The article states that cybersecurity is like using a computer to hack into other computers and social cybersecurity is using computers to hack into humans. This is fascinating because you…
Journal #9
On the Social Media Disorder Scale, I scored a 3 out of 9 which does not qualify me for having a social media disorder. The items in the list were relevant and reasonable to ask to see if someone has a problem with social media. The only thing I would change about the scale would…
Journal #8
After watching the video, I believe there is a lot of media can and has done to misconstrue the public’s view on cybersecurity. First, most media portray hacking and cybersecurity as a quick and easy task if you know what to type, when completing these process actually takes hours or even weeks. Both securing a…
Journal #7
Meme: When your boss finally gives you a five-cent raise for tirelessly defending his company from cyber-attacks daily. This is the main security professional that works at the company. He is the first line of defense within the company, who does all the training and creating the programs and firewalls to keep the company safe. …
Journal #6
Spotting fake websites. The three that were spotted were a PNC banking app, Amazon, and the myODU. First, the PNC banking app seemed normal until a popup happened and asked to update all personal information. Once the popup was clicked it took you to another page where the web address looked weird, and when further…