The principles of science consist of many different factors. Some of these factors of science are defined as objectivity, empiricism, parsimony, determinism, and ethnic neutrality. These factors of science set proper methods in conducting societal and psychological research within the field of cyber technology.Some principles of science within cybersecurity can be explained with examples. Empiricism…
Journal 12 – Digital Forensics with the Social Sciences
From watching the video, I can say that I am impressed with the way he spoke about the ladder he used to work up to where he was. He talked about how he started out as an accountant before he began to move up in the field of IT since he had experience with computers….
Journal 12-Speaking of Mistake of Law
I believe the five most serious violations are (not in order):Sharing Passwords, Addresses, or Photos of OthersI believe that this is a serious violation because accessing private information without consent is illegal and morally wrong, along with posting it for others to see. Taking photos within private property without permission and posting it is also…
Journal 11-Case Study – Sample Data Breach Notification
The letter was addressed to a customer of a company that had experienced an intrusion. The customer was informed that personal information may have been exposed during the attack due to the customer providing credit card information to the provider in the past. Keynesian economic theory could be tied to this incident due to the…
Journal 11-Bug Bounty Policies
The use of the policies allowed for penetration testers to be able to efficiently test for vulnerabilities. The policies are used to analyze and detect specific errors within IT systems and cybersecurity networks. The companies would participate in detecting these codes and report them back to the systems so they can be properly analyzed and…
Journal 10 – Social Themes
A cybersecurity analyst is an individual who specializes in understanding the behavior of cybersecurity incidents, actions of cybercrimes, and the ability to fortify strong cyber systems. Cybersecurity analysts use the ability to understand social behaviors to properly prevent future cybercrime instances and use collected data to use as a background for other departments of a…
Journal 10-Article on Social Cybersecurity
The article describes the aspects of social cybersecurity and how it is applied to government and other cybersecurity fields. Social cybersecurity is being able to understand the reasonings behind some cybersecurity issues and events and learning to fortify systems and policies so future cyber instances do not occur. The article also explains the differences between…
Journal 9-Social Media Disorder Scale
During the past year, have you …• regularly found that you can’t think of anything else but the moment that you will be able to use social media again?I have not.• regularly felt dissatisfied because you wanted to spend more time on social media?I have not• often felt bad when you could not use social…
Journal 8 – Hacking Movies
The media portrays hackers in entertainment as always evil people. They never show the beneficial sides to hacking such as ethical hacking. Ethical hackers such as penetration testers, white hat hackers, and black hat hackers are never portrayed in moves to their full potential. The media will always cause assumptions that all hackers are there…
Journal 7 – Cybersecurity Memes
When it’s cold outside and you still have to get that perfect photo. This can be related to human behavior and technology because humans will stand in any weather conditions in order to complete a digital task. Last minute work at 3:34am on a typical Tuesday morning This can be related to human centered cybersecurity…