-
Cybersecurity and Social Sciences- Presentation Assignment
{Video File Missing: No Source}
-
Journal Entry 15 – Evil AI!?
My main concerns from the video provided are about consenual data usage and law-related precedent. Firstly, how are non-consensual uses of data relating to AI going to be treated in law? OpenAI tested the waters pretty recently with the release of their newest version of Sora, which is a video-generating AI tool. It had seemed……
-
Journal Entry 14 Ranking Crime!
I think the most serious of these internet offences are collecting info about a child, sharing passwords\log in info/photos without consent, bullying, using other people’s internet and recording VoIP without consent in that order (1st is worst). I think that all of these are at least somewhat bad, but some of these matters are more……
-
Journal Entry 13 – Bug Bounty
This is a very unique way of finding bugs in systems, offering a bounty offers non-malicious incentive to hack systems and in return both sides win from this scenario. The paper finds that smaller bounty rewards still lead to similar numbers of bug reports meaning that smaller budgeted cybersecurity teams can make great results while……
-
Journal Entry 12 – Economic Theory
The first theory that this is related to is classical economics. It’s related to the company’s lack of government involvement. They leave the reaching out to government help on the affected parties rather than themselves. The next is rational choice which is related because it is in the company’s best rational interest to notify affected……
-
Journal Entry 11 – Cyber Securtiy Culture
The main social themes that show up in this video are cultures of different cities and networking. The culture of cities is important to take into account when choosing which job opportunities to pursue. The author of this video makes it a serious point to consider the circumstances of the location. She describes the social……
-
Journal Entry 10 – Mini-Article Review
Mulahuwaish et al. discuss what social cybersecurity is, examples of cybercrime and potential solutions. They consider past studies that cover every category possible and what roles those studies play. This article is very informative, and that is evident in the many tables that explain problems, solutions, previous studies and detection methods referenced from those studies….…
-
Journal Entry 9 – Social Media Disorder
On the disorder quiz, I scored a 3, which is considered “risky usage”. This was a bit surprising to me. I do use social media like YouTube and Instagram more than I probably should. I love watching long videos that discuss obscure topics or video essays about movies, shows or games. YouTube is amazing for……
-
Journal Entry 8 – Reviewing Hacking in Media
From what this video shows, there is a decent bit of accuracy when it comes to hacking and cybersecurity in media. Of course, there are cases of the “Bypassing the mainframe…” and “Computer enhance…” moments in media, but the movies/shows that were showcased in the video all appeared to be somewhat accurate. The most egregious……
-
Journal Entry 6 – Spoof Sites
In the first example I used I found that a fake website can have an unfamiliar UI while using the name of a different widely used company to bait in users with a familiar name. The second example I used I found that “spoof” sites will have a very similar UI to other popular or……
-
Journal Entry 5 – Cybercrime Motivation Tierlist
The motives behind cybercrime can range from being super simple to a myriad of emotions and reasons. I am going to rank the most common motives from 1 to 8 (1 making the most sense and 8 making the least). 1. MoneyMoney makes the most sense because it is the leading cause of most crime……
-
Article Reviews
This is a collection of article reviews done for my CYSE 201S class!
-
Journal 4 – Maslow’s Hierarchy of Needs and The Current Online Environment
The online experience and Maslow’s hierarchy of needs have a resounding correlation. The bottom tier, being physiological needs, is fulfilled by access to the internet via a device and a stable connection. Online security fulfills the safety tier. Things like having a secure account and practicing safe behaviors keep unwanted attackers from accessing personal accounts……
-
Journal Post 3 – Research on Security Breaches
Using the data provided by the “Q1 Data Breach Report,” I can see that the companies/organizations that are targeted the most are healthcare and business-related. This shows that these fields are not only important, but hold lots of data that could be valuable to cyber criminals. Researchers can use this information to predict which companies/organizations……
-
Journal Post 2 – Empiricism
Empiricism is an essential principle in any science, and in cybersecurity, it plays a critical role in enhancing protection. By analyzing patterns in user behavior and system data, security teams can identify potential threats and prevent cybercrime before it occurs. This proactive approach allows for the early identification of suspicious activity, which is crucial for……
-
Journal Post 1 – NICE Framework interests
Oversight and investigation are the areas I am most interested in. Investigation seems very engaging as a career because of the problem solving and analysis elements. Oversight seems interesting due to the amount of roles I could play. A career in that area is probably constantly changing because of the sheer amount of responsibilities that……