Career Paper

In the current digital world we live in, cybersecurity analysts have been commonlyknown as the battlefront defenders against any digital threat. They can defend large organizationsfrom cyber attacks, malicious activities, and any other kind of digital threat that exists. With allthis technical expertise, it forms the basis for the profession and industry, but the role…

Article Analysis

In reading the scholarly article, “Concepts and Principles of Cyber Security Strategies,”written by Darius Stitilis, Paulius Pakutinskas, Uldis Kinis, and Inga Malinauskaite, I learnedabout the many comparative areas of national and regional cybersecurity strategies. Thefundamental principles were also explored in how these kinds of policies can be undercutted inour always evolving digital world. This article…

Exploring Social Sciences in the Digital Forensic Scope

After watching Davin Teo’s TED talk on digital forensics, it really got me thinking abouthow this very technical field is actually rooted in social sciences as well. In how Davindescribed his career and the journey it took to get where he is shows the manyintersections between technology and human behavior that I was not able…

The Commonplace Illegal Things We Do on the Internet

In Andriy Slynchuk’s article, they highlighted how there is currently a big gap in digital literacy.This gap shows a disconnect between what internet users routinely do and what is actually legalfor them to do. The title itself even opens up a conversation for what is actually safe for us to doon the internet with the…

The Economic and Social Sides of Bug Bounty

Through our current technological world, there are hackers who exploit the vulnerabilities in acompany’s code to have monetary gain. In the other corner, there are individuals who get paidfor identifying these vulnerabilities for a company legally. This is called the Bug Bounty Policy. Itis a program that is presented as a solution to the many…

Data Breaches and Social Science Theories

Within the sample breach letter that was attached, there are many kinds ofeconomic and social science theories that could be related to it. The economic theoriesthat tied to it most were the Information Asymetry and Externality theories. The socialscience theories that most tied to this letter were the social contract and risk societytheories.Information asymmetry can…

The Paradigm Shift of Cybersecurity

In reading Beskow and Carley’s article on social cybersecurity, there were moments where Icontemplated the shift in our modern view of warfare and national security. In their work, itshowed vivid imagery of a battlefield that is not physical, but in our consciousness, our bonds,and in our beliefs. In the article, it is asserted that information…

Social Behaviors and Cybersecurity Analysis

In analyzing the role of Cybersecurity Analyst within the video, there were many socialthemes that I noticed throughout. They really highlighted how this technical role actuallyinvolves a lot of knowledge in human factors and social dynamics. What really struck me first inthe video was how the presenter described cybersecurity analysts as being people-focusedprofessionals. The role…

Exploring Attacks on Availability

An attack on availability means to target and disrupt access to certain data, services, orsystems that should be reachable for users. These kinds of attacks go after the third type in theCIA triad of confidentiality, integrity, and availability. The most widely known type of attack inthis form is DDoS (Distributed Denial of Service). In these…

Privacy Rights

For PrivacyRights.org, it can be used as an encyclopedia of information for all thedifferent kinds of data breaches that have occurred. It can even list the type of breach, who wasaffected by the breach, the damage of the breach, cause of the breach, etc. This information canprove very valuable to researchers in many ways. Ways…