After reviewing what Andriy Slynchuk has described the eleven things internet users do that may be illegal, I believe five of them stand out the most out of the eleven. To start off with I would say bullying and trolling is one the serious violations. The reason I believe that is because bullying/trolling can make…
Author: jlewi041
Career Paper
Cybersecurity is a growing field that has plenty of opportunities when it comes to choosing a job in the field. According to Indeed, there are “12 types of cybersecurity roles” (Indeed Editorial Team). Even though it might not seem like a lot of roles in cybersecurity many seats need to be filled in cybersecurity. According…
Journal #12
This article does a delicate and excellent job when discussing/explaining the bug bounty policies. According to the Journal of Cybersecurtiy it is “programs where gig economy security researchers are compensated for pinpointing and explaining vulnerabilities in company code bases” (Sridhar and Ng). So in this article they explain that they analyzed multiple proprietary datasets in…
Journal #10
Engineers have one of the most important jobs when it comes to keeping networks safer. So when discussing how engineers keep networks safe I’m going to stay more focused on network engineers. A network engineer is someone who specializes in maintaining, designing, and troubleshooting technological devices (Joshi). According to EMERITUS, “Their tasks include configuring and…
Journal #9
Describe three ways that computers have made the world safer and less safe. The world has evolved so much with the help of computers. Computers have changed the ways of communicating with one another, storing and taking photos and videos, how we buy/sell products, and plenty more ways. But also having computers came with a…
Journal #13
After reading the SAMPLE DATA BREACH NOTIFICATION there are a few ways it can relate to some economic theories. An example of one it can relate to is the Classical economic theory. According to CYSE 201s Module 11, classical economic theory is “ based on ideals of supply and demand and belief that the government…
Journal #11
After watching the video and seeing how social behavior relates to cybersecurity analysts there are multiple ways. Cybersecurity analysts are people who are most of the time the first line of defense (Nicole Enesse – Upskill To Cyber). Also they most of the time respond to incident reports (Nicole Enesse – Upskill To Cyber). Basically…
Journal #10
After reading this article I completely agree with the Army University Press conclusion. Cybersecurity is a growing field and still has a lot more potential to grow in military warfare. Which also means the military will have to have a clear understanding of social cybersecurity or we could be at great danger. As said in…
Journal #3
When viewing the Data Breach Chronology it displays wonderful graphs.The graph displays data that has been collected from companies that have become victims of a data breach. It also shows what states in the U.S.A that data breaches happen. When taking in this information it could tell a consumer which companies to trust. For example,…
Article Review #2
Ja’Qwah Lewis Dr. Leigh Armistead CYSE 201s 17 March 2023 The Emerging Trends in Cybercrime awareness in Nigeria When taking in cybercrime awareness a person would have to understand what it means. Cybercrime awareness is when understanding how much a person knows/understands about cyber threats their network could face. In other words, cyber awareness is…