Journal Entry #12

When reading the academic article on Bug Bounty policy, there were a few key facts mentioned that caught my attention. One of the statistics mentioned in the literature review is that “60% of small businesses shut down within 6 months of suffering a major breach”  (Sridhar and Ng). Another statistic that I found intriguing was…

Journal Entry #15

Write a journal entry describing what you think about the speaker’s pathway to his career In the video, the speaker describes how he was originally an accountant by profession, but found his way into the first Digital Forensics team in Australia. I liked how he used humor to describe people’s believed perceptions of what a…

Journal Entry #11

Write a paragraph describing social themes that arise in the presentation There are a few examples discussed in the video that describe social themes within the Cyber Security Analyst career. For starters, networking with individuals currently in the field can help get your name out and your foot in the door. Second, in the video,…

Journal Entry #10

In the article “Social Cybersecurity: An Emerging National Security Requirement” the author discusses the importance of addressing the rising threats in cyberspace and social media. The authors argue that social media has become a battleground for the promotion of extremist ideologies, foreign influence, and cyber threats that pose significant risks to national security. The article…

Career Paper

Social Science Principles in Penetration Testing             The field of Cybersecurity is widely recognized as multidisciplinary, with many careers in the field utilizing various social science principles and ideas in their day-to-day tasks. Of the plentiful number of jobs that Cybersecurity majors can pursue, Penetration testing is an extremely rewarding career that focuses on identifying…

Article Review 2

“Threat Perception, School Climate and Prejudice as Mediator to Student’s Cyber Aggression”             This study was published by the Journal of Cybersecurity and aims to test the role of school climate and perceived threats on high school students’ cyber aggression behavior mediated by prejudice (Mardianto et al.). The participants in the study consisted of 1118…

Article Review 1

In this article published by the Journal of Cybersecurity, researchers conduct a study to find out if exposure to cyber-attacks influence the public support for intrusive cybersecurity policies. The initial hypotheses were that exposure to cyber-attacks would increase support for security policies, individuals exposed to lethal cyberattacks will exhibit higher support than those who are…

Journal Entry #9

When answering questions on the social media disorder scale, I answered yes to having a failed attempt of spending less time on social media, as well as yes to using social media to help escape negative feelings, but no to the rest of the questions. Overall, I believe the questions asked in the scale could…

Journal Entry #8

How the media influences our understanding of Cybersecurity: In the YouTube video attached to the module PowerPoint, hacker Keren Elazari analyzes and rates the accuracy of various hacking scenes in movies based on realism. According to her analysis, some of the scenes that were given poor ratings for accuracy were due to the fact that…

Journal Entry #6

Find 3 fake and 3 real websites and compare First fake website: http://www.thedogisland.com/ It is rather easy to tell that this is a fake website because it advertises sending your beloved dog to an island, which is both bizarre and extremely unrealistic. Other dead giveaways are the poor site design, and the multitude of pop-up…