After watching the TED talk about Davin Teo career path, I learned a learn alot about digital forensics. According to Davin, digital forensics is the collection, “its analysis and the reporting of various types of leather electronic data that can be preserved in a way to be presented in a court of law” (TEDX Talks)….
Category: CYSE 201S
Journal #9
When ranking myself in Social media Disorder scale I would score as someone who tried to spend less time on social media but failed. I believe the scale is straightforward and easy to navigate. I believe that different patterns are found across the world because different countries have different restrictions when it comes to social…
Journal #14
After reviewing what Andriy Slynchuk has described the eleven things internet users do that may be illegal, I believe five of them stand out the most out of the eleven. To start off with I would say bullying and trolling is one the serious violations. The reason I believe that is because bullying/trolling can make…
Career Paper
Cybersecurity is a growing field that has plenty of opportunities when it comes to choosing a job in the field. According to Indeed, there are “12 types of cybersecurity roles” (Indeed Editorial Team). Even though it might not seem like a lot of roles in cybersecurity many seats need to be filled in cybersecurity. According…
Journal #12
This article does a delicate and excellent job when discussing/explaining the bug bounty policies. According to the Journal of Cybersecurtiy it is “programs where gig economy security researchers are compensated for pinpointing and explaining vulnerabilities in company code bases” (Sridhar and Ng). So in this article they explain that they analyzed multiple proprietary datasets in…
Journal #13
After reading the SAMPLE DATA BREACH NOTIFICATION there are a few ways it can relate to some economic theories. An example of one it can relate to is the Classical economic theory. According to CYSE 201s Module 11, classical economic theory is “ based on ideals of supply and demand and belief that the government…
Journal #11
After watching the video and seeing how social behavior relates to cybersecurity analysts there are multiple ways. Cybersecurity analysts are people who are most of the time the first line of defense (Nicole Enesse – Upskill To Cyber). Also they most of the time respond to incident reports (Nicole Enesse – Upskill To Cyber). Basically…
Journal #10
After reading this article I completely agree with the Army University Press conclusion. Cybersecurity is a growing field and still has a lot more potential to grow in military warfare. Which also means the military will have to have a clear understanding of social cybersecurity or we could be at great danger. As said in…
Journal #3
When viewing the Data Breach Chronology it displays wonderful graphs.The graph displays data that has been collected from companies that have become victims of a data breach. It also shows what states in the U.S.A that data breaches happen. When taking in this information it could tell a consumer which companies to trust. For example,…
Article Review #2
Ja’Qwah Lewis Dr. Leigh Armistead CYSE 201s 17 March 2023 The Emerging Trends in Cybercrime awareness in Nigeria When taking in cybercrime awareness a person would have to understand what it means. Cybercrime awareness is when understanding how much a person knows/understands about cyber threats their network could face. In other words, cyber awareness is…