Digital forensics can be considered a part of social sciences because it talks about the societal impacts that people’s crimes have on people and how digital forensics can help prevent or understand the motives behind the people that are causing… Continue Reading →
Bug bounty policies are an important technique in modern cybersecurity practices. This is because these practices incentivize people called white-hat hackers which are ethical hackers who try to identify vulnerabilities for companies and their main purpose is to help advance… Continue Reading →
2 economic theories that relate to the letter are Cost-Benefit Analysis (CBA) and Moral Hazard. CBA is related because it is the company’s response to the breach which involves offering help with credit card replacement and recommending customers to look… Continue Reading →
I learned that the cybersecurity analyst can make a lot more money as an entry job if you have the time to do a graveyard shift. Most of the work that you do as a cybersecurity analyst is safeguarding technological… Continue Reading →
The article mainly talks about how threats between countries using their military is taking a slight shift towards technological advantages. They are changing from physical battles when people are on a field and more towards fake news and social cybersecurity…. Continue Reading →
I scored a 2 out of 9 mainly because I only use social media when I am bored and have nothing to do. I prefer to hang out with my friends and stay away from my phone if I can…. Continue Reading →
One way that movies make hackers appear is that they are actual geniuses. Any real hacker takes actual time to get into systems and it is not a quick and easy process where they usually get into systems within seconds… Continue Reading →
Picture isn’t letting me transfer it to this document This is Human-centered cybersecurity because I(a human) am working on anassignment online and sometimes you have to worry about other outside issues. Someoutside issues could be getting redirected on other websites… Continue Reading →
fake websites include websites that are phishing, fake online stores, and clone websites. clone websites can be harmful like when someone wants to give you something on steam and needs you to login to your official account when it is… Continue Reading →
© 2025 cyse201s-dsasa001 — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑