3.4 Case Analysis

Ester Martinez UriasPHIL355EModule 3 (CSR)Why the Equifax BreachStings so BadIn Module three we have learned a lot of moral reasoning perspectives, as well asNeoliberalism. After reading this article, I looked back on my learnings on data privacy andtechnology. What is privacy? My assumptions on privacy was the idea of security and thefeeling of safety and…

5.1 Case Study

After reading the article I would like to highlight a comment that Edward Snowden mentioned regarding his whistleblowing:  “you can’t wait around for someone else to act. I had been looking for leaders, but I realised that leadership is about being the first to act.” I believe that Snowden is true to what he believes and…

2.1 Case Study

Looking back to our Privacy module, we learned about the different types of privacy there are.  There is in person privacy, which could be someone being too close to you spying on you or trying to get information out of you by observing you.  This invasion of personal space is a huge part of invasion…

Reflective Writing

Ester Martinez Urias  May 1, 2024  PHIL355E  Cybersecurity Ethics  Reflective Writing Assignment  Cybersecurity Ethics for Future Me  Cybersecurity has become more and more about how we choose to deal with it and use it rather than what it is made for (to protect technology’s privacy). My assumptions about cybersecurity before diving deeper into my degree…

Journal 15 CYSE201S

David Teo’s TedTalk speech on his experiences as a digital forensics investigator was very informative.  As he stated in his introduction, most people usually are confused by what exactly that is.  Which I surely was.  His upbringing as an accountant and working IT allowed him to gain access to knowledge and experience for his upcoming…

Journal 14 CYSE201S

After reviewing the article, I learned a lot about some things internet users do that are illegal.  All of them had their own set of reasons on why they’re serious violations but the following five covered, were the top serious violations for me.  1. Illegal searches on the internet. 2. Collecting Information about people younger…

Journal 11 CYSE201S

Nichole Enesse talks a bit about job outlooks on becoming a cybersecurity analyst. Because this job position is so new, due to how technology is evolving, the job requirements aren’t so strict. As well as it being in high demand.  Updating your resume is a way that you can make yourself seem more professional and…

Journal 10 CYSE201S

In this article, “Social Cybersecurity An Emerging National Security Requirement” by Lt. Col David M. Beskow and Kathleen M Carley, we learn a lot about the importance of adapting cybersecurity into our present and future lives to prevent risks as well as their insight through expertise guidance and experience.  In the article, they highlight social…

Journal 9 CYSE201S

How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world? I believe that I scored better than I expected to.  For my score, I had answered yes to 2/9 of the following questions for Social Media Disorder.  I believe…

Journal 6 CYSE201S

When entering a browser like Google, you may see that there are millions of websites tochoose from. Within all of these websites, some may be fake pages or scammer sites. It is veryimportant for online users to avoid clicking on these sites to prevent bugs and viruses.Unfortunately, not everyone has the knowledge of what to…