Policy Paper 5: Is Policy Effective? What is effective? Merriam-Webster’s dictionary defines effective as: producing a decided, decisive, or desired effect. With that in mind, it is possible for any policy to be effective. That is until it isn’t then revisions are implemented to bring the policy in to compliance. Ultimately, the policy is only…
Policy Paper 4
Policy Paper 4: Social Implications of Information Warfare in a Time of Peace Maintaining information integrity/public support at home and abroad is an important aspect of Information Warfare (IW). Public support for national defense spending and military operations is critical to the success of those efforts. According to the AF Public Affairs office, “The relationship…
Policy Paper 3
Policy Paper 3: Ethical Implications of Acceptable Use Acceptable Use Policies (AUP) are written for the purpose of establishing a set of guidelines that is agreed upon by the user and the creator. In the case of employer and employee workstation and internet use, it is important for organizations to want their employees to work…
Policy Paper 2
Policy Paper 2: Defense Forward and Persistent Engagement In late 2018 Sen. Ben Sasse (R-Neb.), one of many in the electoral branch, held a hearing with Gen. Nakasome, Commander of the U.S. Cyber Command (USCC). Sen. Sasse believed there was an oversight within the USCC and wanted clearly defined lines in the sand when it…
Policy Paper 1
Policy Paper 1: Air Force Instruction 17-130 Cybersecurity is a constant concern for private and government organizations around the world. As technology and availability increase, so too have attacks on organizations. There have been an increasing number of cyber-attacks in the past years and is projected to increase further in the years to come (Brooks,…
Module 10b Journal
https://www.youtube.com/watch?v=iYtmuHbhmS0 A lot of social behaviors expected from cybersecurity professionals can extend to just about any job but even more so with a technical job. It is a given that a cybersecurity analyst should be able to perform the foundational requirements of their job title: cybersecurity and analytics. However, one of the social behaviors that…
Module 10a Journal
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The article “Social Cybersecurity: An emerging National Security Requirement” Lt. Col. Beskow describes how cybersecurity is no longer a technology centric field and that the social/human aspect must be included. This subdomain of national security is called social cybersecurity, sometimes referred to as cognitive hacking, and is the influence of humans and society via…
Article 2 Review
An article review of Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses https://journals-sagepub-com.proxy.lib.odu.edu/doi/full/10.1177/0162243921992844 The article I have chosen for my review strongly revolves around the conversation between the knowledgeable and the unknowledgeable as it pertains to technological or scientific literacy, in this instance cybersecurity. Based on the topics covered…
Module 9 Journal
Social Media Disorder Scale yes = 1 and no = 0 1. During the past year, have you regularly found that you can’t think of anything else but the moment that you will be able to use social media again? No 2. During the past year, have you regularly felt dissatisfied because you wanted to…
Module 8 Journal
Module 8 Journal How does media influence our understanding about cybersecurity? This week’s journal prompt was to review a hacker’s thoughts and opinions after they watched and commented on curated scenes from film and television. However, before I even watched the YouTube video, I had a feeling that they were going to tear Hollywood’s sensationalism…