The TEDtalk about Digital Forensics speaks on his journey in Digital Forensics. What are Digital Forensics? Digital forensics is a branch of forensic science focused on the recovery, investigation, and analysis of digital devices and data for use in legal proceedings. It involves the collection, preservation, examination, and presentation of evidence found on digital devices…
Journal 14
Using Andriy Slynchuks work based on “11 Illegal Things You Unknowingly Do Online ”, here are my five. The first one is “Faking Your Identity Online”, it is illegal to intentionally misrepresent your identity online for fraudulent purposes or to commit crimes such as identity theft, fraud, or harassment. This can involve creating fake profiles,…
Journal 13
The article talks about how companies deal with cybersecurity issues, like fixing problems in their computer systems to prevent hackers from attacking. One big problem is that many companies don’t have clear rules for people to report these issues. This means they might not know about important security flaws. But things are changing. More people,…
Journal 12
Relating the data breach with two economic theories and two social science theories, The first one being Information asymmetry theory linked with economic theories, asserts that in transactions, one party often has more information than the other, leading to market inefficiencies. Within the data breach, the customers of www.glasswasherparts.com were not aware of the breach…
Journal 11
Cybersecurity analysts are professional individuals responsible for protecting an organization’s computer systems, networks, data from security breaches, cyber attacks, and unauthorized access. Their primary role is to identify vulnerabilities in an organization’s IT infrastructure, assess risks, and develop strategies to remove those risks. The job of a cybersecurity analyst connects with how people work together…
Journal 10
The article talks about how keeping our society safe online is really important for our country’s security. It says that the way people act and think online can have a big impact on how wars are fought in the future. Imagine you’re playing a game where you have to protect your castle. In this game,…
Information Security Analyst/Career Paper
An Information Security Analyst better known as (ISA)? “This is an individual who is responsible for protecting an organization’s computer systems and networks. They monitor for security breaches, investigate violations and install security software” (Bhagwat).The job description of being an ISA follows many social sciences principles, to include human behavior and psychology. Understanding human behaviors…
Encryption Controle/Article 2 Review.
“Bugs in Our Pockets: The Risk of Client-Side Scanning” by Harold Abelson, et. al, speaks to the importance of having user information encrypted and kept out of the wrong hands. This article focuses on the way that client-side scanning (CSS) – reviewing the content on users’ devices to detect potential harm or illegal material before…
Journal 9
Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pintrist, forums, weblogs) in past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine) criteria must be met for a…
Journal 8
We can understand that without the media we would not be exposed and informed about many things. For example if we look at the cybersecurity aspect media has a major impact on it. Giving a general understanding of what cybersecurity is. The film industry has also had a big impact on what may go on…