I think that the area I would want to focus my either Protection and defense or Cyberspace Intelligence. I like the idea of the puzzle solving aspects of Protection and defense. Gathering new ideas and ways to protect or get into systems really intrigues me. I think that my least favorite would have to be…
Author: ekosc001
Journal 2
The principles of science, which emphasize systematic investigation, empirical evidence, and hypothesis testing, are closely intertwined with the field of cybersecurity. At its core, cybersecurity involves the protection of computer systems, networks, and data from unauthorized access or attacks. This requires a deep understanding of various scientific disciplines, such as mathematics, computer science, and cryptography….
journal 5
As I reflect on the different motives that drive human behavior, I’ve ranked them from what I think makes the most sense (1) to the least sense (7). Here’s how I would rank them and why: In summary, motives like money, multiple reasons, and revenge seem the most reasonable to me, as they often lead…
Journal 4
Maslow’s Hierarchy of Needs outlines a progression of human motivations, with technology playing a significant role in each level. At the base, physiological needs are addressed by digital tools like food delivery apps and health trackers, ensuring access to essentials without leaving home. For safety needs, technology offers security through tools like GPS navigation, security…
Journal Week 15
After watching Davin Teo’s TEDx talk on his journey into digital forensics, I was inspired by how his career unfolded. Starting as an accountant, he transitioned into IT and eventually specialized in digital forensics. This shift underscores the dynamic nature of career paths and the importance of adaptability. His story resonates with me, as it…
Journal 14
Andriy Slynchuk describes several actions on the internet that could lead to legal consequences, but five stand out as particularly serious. First, hacking and unauthorized access, which involves gaining access to someone’s computer or network without permission, is a major violation as it compromises privacy, security, and can lead to identity theft or more severe…
Journal Entry 13
Summary and Reaction to Bug Bounty Policies Bug bounty programs are an increasingly popular cybersecurity policy that leverages ethical hackers to identify vulnerabilities in a company’s infrastructure. The article “Bug Bounty Programs: Institutionalized Credence Goods” explores the economic and social dimensions of these programs, particularly how they function as cost-effective security measures for organizations. The…
Week 12 Journal Entry
Economic and Social Science Theories in the Sample Data Breach Notification The sample data breach notification from Glasswasherparts.com highlights the financial and social consequences of a cybersecurity incident. The letter informs customers about the breach, outlines potential risks, and provides steps for protecting their information. This situation can be analyzed through both economic and social…
Journal Week 11
In the video “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” several social themes emerge that highlight the importance of interpersonal skills in the cybersecurity field. Cybersecurity analysts often conduct training and awareness programs to educate employees about information security risks, threats, and best practices. This role involves engaging with staff across…