Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The first and most significant offense committed by Andriy Slynchuk is the collecting of information regarding children. It should…
Author: jmaja001
Journal #13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…
Journal #12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter“SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The breach letter relates to economic concepts of knowledge asymmetry and externalities, where a data leak can harm the company’s reputation and have negative effects on the larger community….
Journal #11
Watch this video. As you watch the video think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. In the video, the description of the cybersecurity analyst job reveals several social themes that are relevant to the field. The job…
Journal #10
Read this and write a journal entry summarizing your response to the article on social cybersecurity. I gained a better grasp of the problems that military and civilian organizations confront when it comes to securing their networks from potential cyber threats after reading the essay on social cybersecurity. The article emphasizes the significance of protecting…
Journal #9
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? After taking the online social media disorder scale test, I received a score of 3.0. I believe that the assessment could be improved…
Journal 8
Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes in Movies and TV | How Real Is It? – YouTube After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity? I believe that in today’s media, discussions…
Journal #5
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. There are seven motives that are identified as Entertainment, Politics, Vengeance,…
Journal #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. My experiences with technology demonstrate how physiological needs are met through the internet, which provides unlimited access to information. Basic needs for technology, like food…
Journal #3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Data Breaches can provide valuable public data that researchers can use to not only thwart future attacks but also develop protective measures and educational programs. This will greatly benefit…