Career Paper

Ethical hacking Christian Carrion  4/4/24 Introduction Ethical hacking or sometimes referred to as penetration testing is the use of hacking tools to seek security vulnerabilities in networks or computer systems with authorized permission, according to IBM. In essence, an ethical hacker has the same skills set as an malicious hacker, but doesn’t conduct hacking activities…

Journal Entry 15

Q: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. A:  Digital Forensics is (this is what the speaker’s definition is) the collection, analysis, and reporting of digital data, to be…

Journal Entry 14

Q: . Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. A: The thirteen violations that the author listed in the article “ 11 Illegal Things you Unknowingly Do on the Internet” are all bad offenses. However, these are the top…

Journal Entry 13

Bug bounty programs are a fairly new approach to the cybersecurity landscape. This allows companies to leverage the hacking community to improve their security systems, and in turn the companies pay hackers who find meaningful vulnerabilities. In terms of the relationship between economics and cybersecurity or in this case hacking, this is what the article…

Journal Entry 12

Q: describe how two different economics theories and two different social sciences theories relate to the letter. A: Economic theory: Social Science Theory:

Journal entry 11

In the video, I noticed two social themes. In the first minute or two in the video, the women described in job applications for just entry level cyber security jobs, they expect the application to have 1-3 years of experience in the job, and have many high level technical skills. I identified this as one…

Journal Entry 9

After completing the Social Media Disorder scale, I have a score of 4/9.  When I was reading the items in the scale, I think they portray an accurate assessment of the addiction of using social media. For example, one of the questions asked “ Regularly neglected other activities such as hobbies or homework because you…

Journal 6

Q: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity A: What I have noticed while watching the video is how unrealistic movies, Tv shows and social media portray cybersecurity. For the most part, they depict hackers as super geniuses who can break into a…

Journal 6 entry

Week 6 Journal Entry Q: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? A: There are three ways to identify an trustworthy and reliable: There are three ways to identify fake websites:

Journal 5

Q: Review the articles linked with each individual motive in the presentation page or Slide #3.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. A: There are…