Career Professional Paper

Donte Staves Professor Duvall April 18, 2023 Cybersecurity Specialist Career Professional Paper A cybersecurity specialist plays a very key role in actively securing information just like all other cybersecurity roles do. They have other names that they can be referred to as well, such as information security specialist and cybersecurity professional. According to CompTIA, the…

Article 2 Review

Examining the Social Networks of Malware Writers and Hackers https://www.researchgate.net/profile/Deborah-Strumsky/publication/265260799_Examining_the_Social_Networks_of_Malware_Writers_and_Hackers/links/557e67ca08aec87640dc662f/Examining-the-Social-Networks-of-Malware-Writers-and-Hackers.pdf The article relates to the principles of social science because it talks the community of malware writers and hackers and how they go about sharing information between though their social networks. The objectivity in the article is the way it is stated about how malware…

Article 1 Review

The Importance of Cybersecurity Education in School https://pdfs.semanticscholar.org/f24d/d9d57c7c3c4a14cedfd4eb38073b78124d96.pdf The article relates to the principles of social science because it talks about the criminology of cyberspace as it relates to children and why cybersecurity needs to be taught to children. They are very vulnerable to cybercrime which their parents aren’t even aware of which would be…

Journal Entry 14

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watchthis video and think about how the career of digital forensicsinvestigators relate to the social sciences. Write a journal entrydescribing what you think about the speaker’s pathway to his career. I think his pathway from being an accountant to getting IT is interesting. He took a…

Journal Entry 12

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. I think the five most serious violations are sharing passwords, addresses, or photos of others, bullying and trolling, recording…

Journal Entry 11

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter“SAMPLE DATA BREACH NOTIFICATION” and describe how twodifferent economics theories and two different social sciencestheories relate to the letter. The economic theory rational choice relates to the letter because their business should’ve invested more into their cybersecurity. Another economic theory that relates to the letter is Marxian economic theory this…

Journal Entry 10

Read this and write a journal entry summarizing your response to thearticle on social cybersecurity Social cybersecurity is part of warfare. It is the hacking of “people” and the society along with them. This has such an impact because it doesn’t need physical presence. With the help of social media social cybersecurity is able to…

Journal Entry 9

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? I think I scored good. I think the items in the scale provide a broad scale what would be social media disorder asks questions you…

Journal Entry 8

After watching the video, write a journal entry about how you thinkthe media influences our understanding about cybersecurity How I think the media influences our understanding about cybersecurity is that they make it seem like it’s easily understood. In reality there needs to be a certain level of understanding to even know what is even…

Journal Entry 7

Explain how your memes relate to Human Systems Integration.