Career Paper Cy Ellis CYSE 201S Prof. Yalpi Diwakar Introduction I started my journey as an IT in 2016 after failing out of the Navy Nuclear Power Training Command (NNPTC). I got offered any job I wanted that on a submarine was not nuclear, and on a whim, I chose IT. From the time we…
Category: CYSE 201S
Article Review #2
The Article I have chosen to review is “Cyber Attacks, Cyber Threats, and Attitudes toward cybersecurity policies” by Keren Snider, Ryan Shandler, Shay Zandani, Daphna Canettii. The authors hypothesize that the public would be more receptive to stricter government cybersecurity policies immediately following a cyberattack. They conducted a controlled survey of 1022 Israeli citizens where…
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
The career path of Davin Teo is very relatable to me. I became an IT because that was my job in the Navy, but it wasn’t what I joined to do. I originally had joined to be an Electrician’s Mate in the nuclear community. I ended up failing out of that school and was given…
Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
Bug bounties are a step in the right direction for software developers. Odds are a company will have a breach or be the focus of an intended breach, bug bounties allow for companies to incentivize hackers to report the bugs rather than exploit them. Bug bounties and publicizing findings give hackers a chance for publicity…
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
The Laissez-fare theory applies to this sample letter. The idea that the government should intervene only to protect user’s rights comes into play following a breach. The government should be able to step in after a breach to help minimize the loss of user data. The rational choice theory also comes into play. Businesses leave…
Watch this video, as you watch the video (https://www.youtube.com/watch?v=iYtmuHbhmS0), think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
Cyber security analysts must be knowledgeable in the realm of social sciences. The job requires at an entry level the ability to be a well knowledgeable help desk employee to a more advanced role of helping design software and policy. To effectively do either of these you must be able to understand victimology as well…
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition- Archives/Mar-Apr-2019/117-Cybersecurity/b/
I believe the idea of social cybersecurity is one of the most terrifying things we are up against. This country is already so divided and easily manipulated that adversaries do not even have to try that hard. Let us use the social justice movements of 2020. The murder of George Floyd and subsequent protests were…
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I scored a 2/9 on the Social Media Disorder (SMD) scale. The scale asks good questions to help diagnose social media addiction. It also requires the person answering questions to be completely honest with themselves. But some of the questions feel repetitive such as “Arguments with others” and “serious conflict with your family” feel like…
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
Hollywood has incredibly over dramatized what hacking looks like. While they have gotten slightly more accurate, they still take a lot of liberties. They tend to fall back into the easy stereotypes of the lone wolf quickly exploiting a system in super dramatic fashions. This is rarely how it works. It is much slower and…