How Media Influences Our Understanding About Cybersecurity
Based on the video, i think mostly the media does a pretty good job establishing how hackers execute their game plans to achieve their objectives. However, the examples that the media uses to portray hacking is not always accurate or relatable to reality. The media through movies have succeeded in painting a mostly accurate picture on how hackers operate. Spanning from picking their targets, why they pick those targets, how they search and collect data to help them succeed in attaining their objectives. Without the media’s portrayal of hacking i believe most people will not have an idea of how hackers plot, plan and execute, which will mean that many will also not know how to protect themselves from hackers. Knowing how your attacker attacks provides tremendous insight on protecting yourself from becoming a victim. The media plays a very important role in reminding the public on how serious cybersecurity is and how detrimental it can be if one falls victim to a bad actor. As a result i believe many are aware of cybersecurity and take measures to ensure that they are protected at all times from hackers and bad actors to the best of their abilities.
Social Media Scale
I scored low on the social media disorder scale, mainly because i’m not addicted to social media the way the younger generation is. The items in the scale are a good way to measure the current generations obsession with social media and the need for validation from it particularly from the younger generation. I believe different patterns are found across the world because different culture, different belief systems and different values systems. These are the things that make us different from one nation to the other.
Social Cybersecurity
Social cybersecurity is the protection of humans from information warfare. Social cybersecurity is not like traditional cybersecurity which targets technological equipments but social cybersecurity is targeted at human beings to dictate or to influence the way they think. Due to the advancements in technology information warfare is become the main war that nationals fight against each other rather than traditional wars. Hence, nations have to discover a new way to protect themselves from the information warfare that are waged against them from other nations. Social cybersecurity is predicated on manipulating information and news networks to fulfill an agenda and not necessarily provide accurate information to people. This kind of manipulations are used to influence people’s minds to either accept or reject certain things in society. An example of this is how Russia used information manipulation in time past and even in today’s world to paint nations the don’t like as evil and also propagate the airwaves with favorable informations about themselves to win favor in their eyes of their citizens. Information warfare is the new war that all nations are fighting and desire to emerge as winners. Information warfare in some cases have replaced traditional warfare due to its convenience and and the fact that it requires less resources to fight those wars.
Wha does a Cybersecurity Analyst do ?
A cybersecurity analyst role has many titles depending on the individual companies want to call them. However, the duties performed are usually the same. Moreover, there are many avenues to become a cybersecurity analyst the same way there are many social behaviors that can lead to a singular thing. Networking is one of the keys to be able to secure a job as a cybersecurity analyst. The ability to think and analyze the current world in order to find professional position or decide what to do to secure a job. A cybersecurity analyst has to do what most people do on a daily basis, which analyzing people or information and making decisions.
Sample Data Breach Notification
After reading the article “Sample Data Breach Notification”, I can state the the two economic theories related to it are incentives and scarcity. Incentive relates to the article in the sense that the perpetrators that caused the breach had something to gain from it. Which provided a reason for them to hack the website and to collect customer payment data. This seems to be the main reason why perpetrators take risk to hack systems, because they believe that the reward is worth the risk. Therefore, they are incentivized to take the risk in spite of what potential consequences maybe. The second economic theory that relates to this bleach is scarcity. Scarcity is relatable in the sense that after the breach occurred there are very few options available to the company to mitigate the impact of the bleach. I couldn’t recognize any social science theory that relates with this particular data breach.
Top Five Illegal Things Done on the Internet
1.Using Unofficial Streaming Service
2. Recording a VOIP Call Without Consent
3. Using Copyrighted Images
4. Collecting Information about Children
5.Using Other People’s Internet Networks
Reason :
I listed the above illegal things to do out of the 11 in the article because i believe these five are the most consequential ones that have major impacts on people’s finances, intellectual properties and identifies. when using an unofficial streaming service is stealing money from the creator and the official streamers of the content. Recording a VOIP call without consent is a criminal offense due to using some ones voice or sharing any information unauthorized can cause a lot of damage for that person. Collecting information about children is very dangerous because what will a person collecting information about children in an unauthorized manner suggest about the person that is collecting the information. Using copyright images without authorization is stealing intellectual property.
Digital Forensics
I thought Davin Teo’s path to his career was very interesting. The fact that he attributed his career choice to his father really stood out to me on how parents can be fundamental in shaping the interests of their children. I thought it was great that he started out as an accountant based on what he could do at the time and then later transitioned into a forensic investigator. He seems to really enjoy his career as a forensic investigator, which also means that he does a very good job at executing his job responsibilities.