Introduction At the most basic level, a cybersecurity analyst is someone who analyzes systems and creates programs and systems to defend other systems from cybersecurity attacks. They mostly look for vulnerability’s in systems and find holes that a cybercriminal could use to get in. They are also important during active cybersecurity incidents in figuring…
Cybersecurity & Social Science Article Review #2
Summary of the article The article I chose to review, “Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)”, at its simplest, looks at cyber-attacks in healthcare industry. More specifically it applies the RAT (Routine Activities Theory) and CRAT (Cyber Routine…
Cybersecurity & Social Science Article Review #1
Summary of the article The article I chose to review, “Cyberbullying During COVID-19 Pandemic: Relation to Perceived Social Isolation Among College and University Students”, looks into cyberbullying and cyber victimization during the peak of the COVID-19 Pandemic. The article relates to the Objectivity and Ethical Neutrality principles of the social sciences. The hypothesis of…
Week 15 – Journal Entry 15
The man in the video, David Teo, didn’t seem to start as a digital forensic investigator, but rather an accountant. He seems to of accidently entered the world of IT and later cybersecurity as simply because his job was looking for someone with IT experience and he decided to apply for the position, which…
Week 12 – Journal Entry 14
Out of the eleven things internet users do that may be illegal, the five that I think are the most serious violations are: Sharing Passwords, Addresses, or Photos of Others, Recording a VoIP Call Without Consent, Using Other People’s Internet Networks, Collecting Information About People Younger Than 13 and Illegal Searches on the Internet….
Week 11 – Journal Entry 12
I would say the first economics theory that could relate to the letter would be the Laissez-fare economic theory. In this case, law enforcement did not get involved with incident until long after the breach was discovered. The government did not intervene to protect the user’s privacy until after the incident happened. The Rational…
Week 10 – Journal Entry 11
Honestly, as far as I can tell just based on the video, cybersecurity analyst job isn’t really related too much to social behaviors. Based on our notes however, a cybersecurity analyst might have to be a team player and also someone who is always keeping up to date on cyber threats and different ways…
Week 9 – Journal Entry
So looking at the Social Media Disorder scale, I got a 3 out of 9. I’m honestly not sure how I feel about the questions on that “quiz”, but I frequently use social media differently than most people. I use it to find artwork posted by people, not to share my life or read…