Generally speaking, a job in cybersecurity requires an interdisciplinary set of technical abilities, intellectually challenging domains, and research-focused subject disciplines. It is a job that is significant to securing the social and technological domains of human life; security awareness trainers rely extensively on social science research and ideas. Understanding human motivations, decision-making processes, and the…
Author: fgonz006
Article Analysis Paper: Are Bot Farms Friend or Foe?
Photo credits: Reddit, google, cheq.ai Abstract Bot farms can come in many shapes, sizes and forms. They can be phone, PC-based or hybrid. The above picture shows a very small one, but they can be set up at a large industrial scale to include thousands of fake and automated accounts. The many articles used for…
CYSE 201S Module 14 Journal Entry Digital Forensics: Pathway To A Career InPart To The Social Sciences
After watching the speaker Mr. Davin Teo in his presentation on digital forensics, I am just amazed at how many fields of social sciences are involved. A profession in digital forensics requires strong connections to the social sciences especially, economics, criminology, linguistics, psychology, and sociology to mention a few. Gathering informational evidence is a meticulous…
CYSE 201S Module 12 Journal Entry Things We Might Be Unconsciously Doing Illegally In The Internet
Andriy Slynchuk has created a list that we as internet users might unconsciously be doing illegally, while we are living our digital daily lives. Some are not as serious as others, but with some you might end up in jail and or with criminal charges. So he is giving us some ways to avoid these…
CYSE 201S Module 11 Journal Entry 2 Bug Bounty Policies
As I was reading the article, I was fascinated, and had no idea about bug bounty policies or programs’ real effect at the business scale. I can understand why a lot of businesses are dubious about third-party companies reporting cybersecurity flaws and vulnerabilities. Nobody wants to get strangers into their own backyards and find out…
CYSE 201S Module 11 Journal Entry 1 Data Breach Notification Letter: Economic & Social Science Theories
The notice is a notification of a data breach that happened to the company, and the shopper was getting notified that his purchase that he did online thru www.glasswasherparts.com, might have been compromised. It is explained that someone or someone’s access to the companies servers client information without authorization, and also stated what the recommendations…
CYSE 201S Module 10 Journal Entry 2 Social Cybersecurity on Emerging National Security
Social cybersecurity is here to stay, and it might be the next war we might be fighting? We are already battling with information warfare. This might be a military article but it applies to the civilian sector. The author’s statement is correct, the use or misinformation can be a powerful tool, it weakens the trust…
CYSE 201S Module 10 Journal Entry 1 Social Themes in Cybersecurity Jobs
The job of a cybersecurity analyst, may intrinsically connect many social behaviors and. many human factors that might affect cybersecurity risks and results, incorporating various social themes. It is clear that it is crucial to comprehend and understand the variations of social cybersecurity. The focus and emphasis in addressing and recognizing the social and human…
CYSE 201S Week Eight Journal Entry How media influences our understanding about cybersecurity
By looking at the videos, well Hollywood is Hollywood, it has made it very entertaining in depicting cyberattacks and hackers. I have always been fascinated by how smart and cool hacking is displayed, so cool, easy and practical. They make it seem so classy, uncomplicated, and fast, so fast with so many pop-ups, and with…
CYSE 201S Week Seven Journal EntryCybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation
My belief is that technical advantages and capabilities are becoming greater that we will be able to maintain and handle in the near future, going through these courses and understanding what cybersecurity entails, it has briden my understanding, and it has got me concerned. To read that professionals are losing the interest in using the…