Module 15

Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. The career of digital forensics relates to the social sciences because it involves understanding human behavior, legal and ethical considerations, and social…

Module 14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. https://clario.co/blog/illegal-things-you-do-online/ This article served as a revealing guide to various activities on the internet that may be illegal, prompting…

Module 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…

Module 12

Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.  https://dojmt.gov/wpcontent/uploads/Glasswasherparts.com_.pdfLinks to an external site.  Economic Theories: Social Science Theories:

Module 11

As a Cybersecurity Analyst, social behaviors play a significant role in understanding and mitigating potential threats. The presentation delves into the intersection between human behavior and cybersecurity, highlighting how individuals’ actions impact digital security. Cybersecurity analysts frequently deal with the human element of security breaches, particularly in the context of social engineering. This tactic exploits…

Module 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. In reading Lt. Col. David M. Beskow and Kathleen M. Carley’s article on social cybersecurity, I was intrigued to find out about the shifting landscape of warfare. The article showed the evolution from traditional…

Module 9

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? On the social media disorder scale, I scored a 2/9 meaning that only 2 of the items pertained to me. The items in the scale…

Module 8

Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site. After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity. After watching the…

Module 7

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration. https://unsplash.com/photos/mfB1B1s4sMc https://unsplash.com/photos/gySMaocSdqs https://unsplash.com/photos/ICTKcvnXx_8 https://unsplash.com/photos/Z3ownETsdNQ https://unsplash.com/photos/5QgIuuBxKwM https://unsplash.com/photos/R6dSBkz32B8 https://unsplash.com/photos/BXiLSwwvqrY https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg

Module 6

Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? Real Websites: https://www.amazon.com/ https://www.walmart.com/ https://www.sephora.com/ These are recognizable well-known brands. They use HTTPS to encrypt data and ensure user security. They have contact information such as email addresses and phone numbers. The website…