Journal Entry 15

Digital forensics investigators’ careers significantly overlap with those of the social sciences. Understanding human behavior, motivation, and social dynamics within the digital realm is involved in the profession. A number of ethical issues come into play when investigators have to balance privacy concerns with investigative needs. Social problems they usually face, such as fraud, cyberbullying, and threats, require insight into both societal norms and workplace cultures. It requires not only technical expertise but also a deep understanding of human psychology and social structures. In this rapidly changing field, professionals must update their methods to consider the…

Journal Entry 14

Of all the illegal online activities described, five are particularly serious in terms of potential consequences and ethical implications: using unofficial streaming services and torrent sites to access copyrighted content without paying, thus depriving creators of their due compensation and exposing users to legal risks; cyberbullying and trolling, with potentially serious psychological consequences for victims…

Journal Entry 13

A study by HackerOne has revealed important details pertaining to bug bounty programs. These programs are when companies pay freelance security researchers to discover and report any problems with their systems. Security researchers are mostly not motivated by money. They have a low price elasticity of 0.1-0.2, meaning that even companies with small budgets can gain advantages. A company’s size and brand don’t greatly affect how many vulnerability reports they get, which means smaller companies can use these programs well. The finance, retail, and healthcare sectors usually get fewer reports, but this isn’t a strong finding. As programs get older, they get fewer reports because the easier vulnerabilities get found first. It’s also important to mention that…

Journal Entry 12

Two economic theories and two social science theories with respect to the sample data breach notification letter.Economic Theories:Rational Choice Theory: The fact that the company will inform the customers represents a rational choice, balancing the costs and benefits of disclosure. After all, this goes in line with an idea that people and businesses tend to make choices in their best interests. Classical Economic Theory: The breach and its handling present a case for the interaction of supply and demand in cybersecurity services. The incident may elevate demand for more sophisticated security and…

Journal Entry 11

Social skills that cybersecurity analysts should apply are networking and relationship-building skills. The video indicates participation with the community, technical meetups, and sharing with other professionals in the field to get involved. This proves that social and professional relationships are the success factors leading to career development. The job consists of a number of social…

Journal Entry 10

The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley presents a compelling case for the importance of social cybersecurity in today’s digital landscape. The authors contend that the social media platforms have emerged into a new battlefield where the adversaries conduct information warfare. The sort…

Journal Entry 9

I scored 2 out of 9 on the SMD Scale, answering “yes” to questions 6 and 9. It would appear that I have some problematic patterns in my use of social media, particularly those dealing with arguments with others and conflicts with family or friends for not using it enough to connect online. Although my…

Journal Entry 8

The portrayal by the media concerning cybersecurity goes a long way in shaping the perception of people; this makes the lines between what is real and what is not very blurred. While others try to stick to the truth, some are modified to add dramatization. This perpetuates misconceptions concerning the actual rate at which hacking…

Journal Entry 7

“When you’re so focused on your work, you forget about phishing emails” This meme illustrates how intense concentration can lead to overlooking cybersecurity threats, emphasizing the need for constant vigilance. “Work device: Fort Knox. Personal phone: Welcome hackers!” This meme addresses the potential security gap between work and personal devices, emphasizing the need for consistent…

Journal Entry 6

Key differences while comparing fake and real sites. The three common fake websites make use of popular platforms such as facebook.com, amazon.com, and paypal.com. These fake sites generally have minor discrepancies in the URL such as faceb00k.com, arnazon.com, and pàypal.com. They may lack security in HTTPS, poor quality design, or a large number of spelling…