Career Paper

Career Paper  Cy Ellis  CYSE 201S  Prof. Yalpi Diwakar  Introduction  I started my journey as an IT in 2016 after failing out of the Navy Nuclear Power Training Command (NNPTC). I got offered any job I wanted that on a submarine was not nuclear, and on a whim, I chose IT. From the time we…

Article Review #2

The Article I have chosen to review is “Cyber Attacks, Cyber Threats, and Attitudes toward cybersecurity policies” by Keren Snider, Ryan Shandler, Shay Zandani, Daphna Canettii. The authors hypothesize that the public would be more receptive to stricter government cybersecurity policies immediately following a cyberattack. They conducted a controlled survey of 1022 Israeli citizens where…

Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings. 

Bug bounties are a step in the right direction for software developers. Odds are a company will have a breach or be the focus of an intended breach, bug bounties allow for companies to incentivize hackers to report the bugs rather than exploit them. Bug bounties and publicizing findings give hackers a chance for publicity…

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The Laissez-fare theory applies to this sample letter. The idea that the government should intervene only to protect user’s rights comes into play following a breach. The government should be able to step in after a breach to help minimize the loss of user data. The rational choice theory also comes into play. Businesses leave…

Watch this video, as you watch the video (https://www.youtube.com/watch?v=iYtmuHbhmS0), think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. 

Cyber security analysts must be knowledgeable in the realm of social sciences. The job requires at an entry level the ability to be a well knowledgeable help desk employee to a more advanced role of helping design software and policy. To effectively do either of these you must be able to understand victimology as well…

Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition- Archives/Mar-Apr-2019/117-Cybersecurity/b/ 

I believe the idea of social cybersecurity is one of the most terrifying things we are up against. This country is already so divided and easily manipulated that adversaries do not even have to try that hard. Let us use the social justice movements of 2020. The murder of George Floyd and subsequent protests were…

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

I scored a 2/9 on the Social Media Disorder (SMD) scale. The scale asks good questions to help diagnose social media addiction. It also requires the person answering questions to be completely honest with themselves. But some of the questions feel repetitive such as “Arguments with others” and “serious conflict with your family” feel like…