Ethical Considerations of CRISPR Gene Editing: Ensuring privacy and data security in BioCybersecurity means keeping sensitive biological and medical information safe from unauthorized access and misuse. Ethical concerns include getting informed consent, minimizing risks, and preventing discrimination related to genetic information. This involves using strong security measures like encryption and access controls, as well as…
Journal Entry 15
Digital forensics investigators play a crucial role in examining digital evidence to solve cybercrimes, identify suspects, and can bring this information to court to help with the legal side. Understanding human behavior and social dynamics is extremely important when it comes to digital forensics. Digital forensics often involves analyzing communication patterns, social interactions, knowledge of…
Journal Entry #14
After reviewing the article about the eleven potential illegal actions on the internet, there were five things that stood out to me. Hacking into computer systems can lead to massive data breaches and harm to national security. Distributing copyrighted material without permission undermines the creators’ rights and leads to them missing out on money. This…
Week 12 Entry 13
The article examines bug bounty policies, these bounties pay individuals to find and report vulnerabilities in a company’s cyber infrastructure. This emphasizes their economic basis, as they offer a cost-effective way for companies to bolster their defenses by tapping into external expertise. The literature review traces the evolution of bug bounty programs and highlights their…
Week 12
Two different economic theories that relate to the letter would be Supply and Demand, and the Cost-Benefit Analysis theories. The supply and demand theory focuses on the need for something, and its availability affects its value. In the letter, the company is providing information (This would be the supply) about the breach to meet customers’…
Journal Entry 11
The description of the cybersecurity analyst job reveals connections to social behaviors, particularly regarding how cyber threats exploit human vulnerabilities. A significant theme is the manipulation of trust, fear, and curiosity by attackers to infiltrate systems. Understanding social engineering tactics, where attackers exploit relationships and dynamics, is crucial. Furthermore, the collaborative nature of cybersecurity work…
Article Review #2
Article Review #2: Faqir-Digital Criminal Investigations in the Era of Artificial Intelligence: A Comprehensive Overview The article “Exploring the Impact of AI on Digital Criminal Investigations” delves into the fascinating realm where artificial intelligence meets with law enforcement. This topic resonates deeply with the principles of the social sciences, as it unravels the complex dynamics…
Journal Entry 10
The article explores the critical domain of social cybersecurity, emphasizing its profound impact on national security. It discusses the shift from traditional warfare to information warfare, where manipulating human behavior through technology has become a strategic imperative. The multidisciplinary nature of social cybersecurity is highlighted, drawing from fields like psychology and sociology. The article also…
Journal 9
After reading through the Social Media Disorder scale, I personally answered No to all of these questions. The items in the scale assess aspects of social media usage that may indicate addictive or problematic behaviors (Preoccupation, Tolerance, Withdrawal, Persistence, Displacement, Problems, Deception, Escape, and conflict.). In different parts of the world, different cultures may have…
Week 8
The media holds considerable power in shaping our understanding of cybersecurity. Often they portray cyberthreats through dramatic narratives and crazy headlines. These types of portrayals exaggerate the severity of cyberattacks and contribute to fearmongering among the public. The media focuses on high-profile incidents and overshadow important aspects of cybersecurity. Entertainment media perpetuates misconceptions about cybersecurity…