CYSE 201S

  • Journal 15
    The presenter and his career journey highlight how digital forensics investigation is related to social sciences. In fact, at the beginning of his career digital forensics or cybersecurity was not a field one could even study. His educational background was actually in accounting. While working in his accounting job, his company requested help in the…
  • Journal 14
    Of the list of 11 illegal acts online I believe searching for unlawful search terms would be the most serious offense. There are few legitimate reasons to seek out that information and if you want that information there’s an implication of something more sinister. Then after that, I would place collecting information about children as…
  • Journal 13
    After reading the article, I found the bug bounty approach to be an effective and innovative approach to finding and fixing vulnerabilities in an organization’s cyber infrastructure. The policy motivates people knowledgeable in cyber to help out your organization for several motives. First, there is the obvious financial gain for the bug bounty hunter, but…
  • Journal 12
    The Sample Data Breach Notification letter is an example of both economic and social science theories. The breach could be viewed as evidence of the Marxian economic theory that believes those with power and resources exploit those who don’t for their gain. The glass washer company had the resources for a service people found desirable….
  • Journal 11
    The video describing the job of a cybersecurity analyst touches on several social themes. First, there was a general description of tasks which included a help desk role, dealing with phishing scams, and user training. While these tasks do have a technical basis the main aspect is people, not technology. From a technical skill standpoint,…
  • Journal 10
    The article discusses an understated aspect of the topic of cybersecurity, which is social cybersecurity. Social cybersecurity is the hacking of humans and society, where technology is used to influence and control them. It is an important topic because social cybersecurity has implications for the international political balance between superpowers, namely the United States and…
  • Journal 9
    I answered yes to two of the nine questions regarding the Social Media Disorder scale testing. According to the scale, five or more yes responses are associated with having a social media disorder. I recognize that the items on the scale are realistic problems that people have with their social media usage. I can picture…
  • Journal 8
    After watching the video, I noticed that the media has an inconsistent track record of how accurately they display the process of hacking and cybersecurity in general. The most common distortion was how long these processes take to happen. The clips showed hacks taking seconds to happen, when more complicated hacks could take days, or…
  • Journal 7
    Explanation: The image shows the weakest link of cybersecurity. Many would assume that the the device would be the weakest link, but it reality many breaches and cyberattacks are caused by human error. Human centric cybersecurity recognizes the human element of the situation. Explanation: Even though recognizing a phishing email might be obvious to some…
  • Journal 6
    One type of common scam involves fraudulent websites that impersonate legitimate sites in an attempt to trick users into downloading malware or divulging sensitive information such as a credit card. These sites will impersonate banking sites, popular commerce sites like Amazon or eBay, or well-known brands like Apple. Fortunately, there are several signs to look…
  • Journal 5
    If ranking the motives behind cybercrime from 1 (making the most sense) to 7 (making the least sense) I would list them:
  • Journal 4
    Maslow’s hierarchy of needs is a five-level pyramid showing the basic, psychological, and self-fulfillment needs that Maslow believed all humans attempt to meet. In ascending order, the levels are physiological needs, safety needs, belongingness/love needs, esteem needs, and finally self-actualization. As a lower level is satisfied, the person then focuses on the next highest level,…
  • Journal 3
    The website PrivacyRights.org provides a vast wealth of important information regarding breaches that could benefit researchers. One image the website offers is a hotspot map of the United States showing the amount of reported breaches by state. From this, we see that the most targeted states include California, Texas, New York, Maryland, Massachusetts, Indiana, Illinois,…
  • Journal 2
    While applying scientific principles to cybersecurity may not be obvious at first, examining the topic through a social science lens can help reveal the use of these principles. The first principle, relativism, is the view that all things are related to one another and is probably the easiest to relate to cybersecurity. As the use…
  • Journal 1
    The NICE Framework describes seven broad work role categories commonly found within the field of cybersecurity. The categories that I found the most appealing were Protection and Defense as well as the Investigation category. Previously, I completed a course in Digital Forensics that I found truly fascinating. In that class, I got to use some…