Journal 15

The presenter and his career journey highlight how digital forensics investigation is related to social sciences. In fact, at the beginning of his career digital forensics or cybersecurity was not a field one could even study. His educational background was actually in accounting. While working in his accounting job, his company requested help in the…

Journal 14

Of the list of 11 illegal acts online I believe searching for unlawful search terms would be the most serious offense. There are few legitimate reasons to seek out that information and if you want that information there’s an implication of something more sinister. Then after that, I would place collecting information about children as…

Journal 13

After reading the article, I found the bug bounty approach to be an effective and innovative approach to finding and fixing vulnerabilities in an organization’s cyber infrastructure. The policy motivates people knowledgeable in cyber to help out your organization for several motives. First, there is the obvious financial gain for the bug bounty hunter, but…

Journal 12

The Sample Data Breach Notification letter is an example of both economic and social science theories. The breach could be viewed as evidence of the Marxian economic theory that believes those with power and resources exploit those who don’t for their gain. The glass washer company had the resources for a service people found desirable….

Journal 11

The video describing the job of a cybersecurity analyst touches on several social themes. First, there was a general description of tasks which included a help desk role, dealing with phishing scams, and user training. While these tasks do have a technical basis the main aspect is people, not technology. From a technical skill standpoint,…

Journal 10

The article discusses an understated aspect of the topic of cybersecurity, which is social cybersecurity. Social cybersecurity is the hacking of humans and society, where technology is used to influence and control them. It is an important topic because social cybersecurity has implications for the international political balance between superpowers, namely the United States and…

Journal 9

I answered yes to two of the nine questions regarding the Social Media Disorder scale testing. According to the scale, five or more yes responses are associated with having a social media disorder. I recognize that the items on the scale are realistic problems that people have with their social media usage. I can picture…

Journal 8

After watching the video, I noticed that the media has an inconsistent track record of how accurately they display the process of hacking and cybersecurity in general. The most common distortion was how long these processes take to happen. The clips showed hacks taking seconds to happen, when more complicated hacks could take days, or…