Out of the 11 listed illegal actions users unknowingly do online, I believe that these five are the worst. Sharing Passwords, Addresses, or Photos of others: Sharing the passwords, addresses, photos, or any other private information of another online without explicit permission on the list because the leaking of passwords may lead to cyberattacks targeted…
Author: crumb001
Module 11 Journal: Bug Bounties(CYSE201)
Bug bounty policies are a rather genius method of recruiting cyber help at low cost. As stated in the article, SME’s struggle the most to recruit talent, while also having the most need for talent. Establishing bug bounty programs can help smaller organizations seek and remediate vulnerabilities they may not have the in-house talent to…
Module 10 Journal(CYSE201)
Some responsibilities Nicole listed for a cybersecurity analyst are: Responding to phishing and intrusion attempts I feel that technical and social skills play into this responsibility. Technical skills are needed to assess what happened in the incident, and social skills/ working with a team are important to develop a plan for dealing with the incident….
Module 10 Journal(CYSE201)
After reading the article “Social Cybersecurity: An Emerging National Security Requirement,” I had a few thoughts. First, I found it interesting and wholly agree that “left unchecked, this emerging ‘information blitzkrieg’ will have strategic effects on par with the physical blitzkrieg unleashed at the onset of WWII.” As the world relies more and more upon…
Module 9 Journal(CYSE201)
I scored 1/9 on the Social Media Disorder scale. Out of the 9 points, I scored on “tried to spend less time on social media but failed.” I deleted all of my social media accounts, excluding Reddit, a few years ago in order to combat some of the issues seen within the disorder scale. Of…
Module 8 Journal(CYSE201)
I believe that the media influences our understanding of cybersecurity primarily by glorifying cybercrime and mostly ignoring security professionals. In most movies or TV shows containing cybercrime/hacking, the hackers are usually the main character and glorified in their acts. I believe firstly that this provides a poor example for people watching such media, and may…
Fake vs. Real Websites
Can we create three fake websites and three real websites and ask them to spot what makes them fake? I believe that, depending on the experimental setup, some groups may be able to detect fake websites versus real. For example, if a group of technically savvy individuals such as IT workers or cybersecurity professionals were…
Maslow’s Hierarchy of Needs(CYSE201)
Physiological Needs My physiological needs pertaining to technology would probably include my phone, pc, and active connection to the internet. In today’s world we can do much with devices, however most people need a connection to the internet in order to do what they wish with their devices. One time I specifically remember not having…
Ranking Motives(CYSE201)
For this journal entry I will equate each motive in terms of cybercrime as it relates most to the class. 1. For MoneyI feel that hacking for money makes the most sense as a motive. Everyone needs money to survive, and while within the article around 35% of the sampled group spent money earned from…