Davin Teo’s pathway into digital forensics sounds very similar to others that have followed their passion even if it took them away from their home. David mentions becoming involved in IT and that slowly opened doors which led him to digital forensics. He didn’t start out wanting to pursue a career in this specialized field. Through hard work, David was… Read more →
Category: Journal Entries
Journal Entry Fourteen: 11 Illegal Things you Do Online
The author sheds light on eleven illegal actions users may participate in while online. Of the eleven, five are very serious and should be avoided at all costs. First, the bullying/trolling of others via the internet. This issue has caused a great deal of damage to include prompting suicide and causing people to leave their childhood hometown. Victims feel they… Read more →
Career Paper
Career PaperCYSE 201sAdam Tucker29NOV2023The Crucial Role of Social Science in Cybersecurity AnalysisIn the ever-changing field of cybersecurity, technical expertise alone is insufficient toreduce the diverse and sophisticated threats that organizations face. Cybersecurity analystsincreasingly depend on social science research and principles to understand the human aspect ofcyber threats, develop effective strategies, implement them, and foster a security-awareorganizational culture. This paper explores… Read more →
Journal Entry Thirteen-Bug Bounty
This article covers the use of bug bounty policies by companies and organizations to identify vulnerabilities within their networks. These policies aren’t used by all organizations for fear of legal action but companies of all sizes have found them to be useful. Linus’s Law was referenced in the article as it essentially means that the more eyes you have looking… Read more →
Journal Entry Twelve: Case Study
In this sample data breach letter we see the “laissez-fare” and the “classical economic” theories. The former is where the government, or in this case, the company won’t interact unless the customers rights have been violated. This is an “action after damage” approach where very little is done to prevent them. The classical economic theory is where the government does… Read more →
Journal Entry Eleven: Social Themes and Cybersecurity
The social themes that arise in this video are employment, pay vs location, and how to become a cyber security analyst. Nicole gives us a brief overview on the largest cities requiring cybersecurity talent. She covers the employment theme and explains the pros and cons of getting a job in Atlanta vs Washington DC. She then covers what you need… Read more →
Journal Entry Ten: Social Cybersecurity
Lt. Col. Beskow’s article on social cybersecurity describes how cybersecurity is changing. Traditional cybersecurity is protecting a network, or friendly infrastructure, from an enemy organization. An example would be the Student attack of early 2010-2011 where an Iranian enrichment facility was targeted. Social cybersecurity is utilizing the internet to target people, or groups of people. The goal is to sway… Read more →
Journal Entry Nine: Social Media Disorder Scale
I scored a 2.0 on the Social Media Disorder Scale. This number is pretty low compared to other people but I knew going into the assessment it would be. I don’t use social media often and do not post. The questions on the assessment were great questions because my friends exhibit some of these qualities. My friends have missed outings… Read more →
Journal Entry Eight: How the Media Portrays Hacking and Hackers
The media plays a pivotal role in shaping our understanding of cybersecurity by acting as a double-edged sword. On one hand, it serves as an educational tool, helping the public become aware of the ever-evolving threats in the digital landscape. These movies and television shows reach a large audience so the amount of exposure is incredible. They highlight major breaches,… Read more →
Journal Entry Seven: Human-Centered Cybersecurity
The meme above was created to show what I’ve seen in the workplace at facilities that DO NOT utilize the human-centered cybersecurity model. I don’t think enough emphasis was placed on cybersecurity and it became just another training to be completed. If the human-centered cybersecurity model was implemented, the photo above would show a well informed, properly trained technician/engineer completing… Read more →