Journal #15

Prompt: Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watchthis video and think about how the career of digital forensicsinvestigators relate to the social sciences. Write a journal entrydescribing what you think about the speaker’s pathway to his career. In his TED talk, Davin Teo discusses his journey to becoming a professional in the…

Journal #14

Prompt: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Andriy Slynchuk provides eleven examples of common actions taken by internet users that can in some cases be…

Journal #13

Read this article: https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. In the article “Hacking for Good: Leveraging HackerOne Data to develop an Economic Model of Bug Bounties” by Kiran Sridhar and Ming Ng, the research…

Journal #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Several social and economic theories can be applied to the sample data breach notification letter; however, these four theories are the most fitting, the first of which is…

Journal #11

Watch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation. Nicole Enesse describes the role of a cybersecurity analyst as deeply intertwined with social behaviors. Analysts delve into human factors in understanding cyber threats. Social…

Journal #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity.https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The article underscores the evolving nature of warfare, where information and psychological tactics play a pivotal role. The recognition that internal vulnerabilities pose a significant threat necessitates a paradigm shift in military strategies. Social cybersecurity emerges as a critical…

Journal #9

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you …• regularly found that you can’t think of anything else but the moment that you will be…

Journal #8

After watching the video https://www.youtube.com/watch?app=desktop&v=6BqpU4V0Ypk, write a journal entry about how you think the media influences our understanding about cybersecurity Cybersecurity has become an increasingly prominent field and subsequently gained the attention of popular media. As with most things, the media dramatically exaggerates hacking and cybersecurity to make them more appealing to the audience. An…

Journal #7

Review the following ten photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s). This meme presents a situation in which someone came across a comically designed USB and made the mistake of plugging it into a word device. While this scenario is an…

Journal #6

Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? DO NOT USE LINKS!!! All fake links have been slightly altered to avoid accidentally visiting them.After doing some some research I was able top identify some fake websites posing as legitimate retailers. these…

Journal #5

Review the articles linked with each individual motive. Rank themotives from 1 to 7.

Journal #4

Maslow’s Hierarchy of Needs is a psychological theory that arranges human needs into a five-tier pyramid. Each level represents a different category of needs, and individuals are believed to strive to fulfill these needs in a hierarchical order. Often associated with the physical world, Maslow’s Hierarchy of Needs is undeniably applicable to our increasingly digital…

Journal #3

cybersecurity as it identifies common trends related to cyber-attacks and online activity. Through public information, researchers and cybersecurity specialists can identify vulnerabilities and which individuals and organizations may be primarily targeted by cybercriminals. The data may be an inaccurate representation of the frequency in which certain cybercrimes are committed due to the limiting factor of…

Journal #2

Explain how the principles of science relate to cybersecurity: In cybersecurity, applying scientific principles is critical for comprehending the intricacies of evolving threats, developing effective defense mechanisms, and advancing the overall resilience of digital systems. After taking a course in criminology, the link between criminology and social sciences as a whole to cyber security became…

Journal #1

The National Institute of Standards and Technology (NIST) crafted the NICE workforce framework to encompass a broad spectrum of cybersecurity domains, each accompanied by distinct job positions and detailed descriptions. Throughout the framework, several categories and specializations vary heavily on proficiency and focus within cybersecurity and IT majors. An interesting area for a potential cybersecurity…