Every internet user does something illegal on the internet. According to Andriy Slynchuk explains that there are many ways internet users do that may be illegal by using unofficial streaming services, torrent services, copyrighted images, sharing (passwords, addresses, or photos of others, bullying and trolling, Recording a VoIP call without consent, faking your identity online,…
Journal Entry #13
This article provides the use of policies that consist of the Lack of vulnerability Disclosure policy and the bug bounty as a helpful tool in cyber-attacks. it seems to me that the policy is very helpful when attacks occur because it prevents hackers from stealing information and causing businesses to shutdown which is amazing to…
Journal Entry #12
The two different economic theories that go along with The sample breach letter “SAMPLE DATA BREACH NOTIFICATION” consists of the Marxian economic theory and the Laissez-fare theory. I say this because the Marxian economic theory relates to this letter and in the letter explains how powerful it was for these anonymous hackers to steal this…
Journal Entry #11
In this video there was many different social themes that arise in this presentation that consisted of trying to become a cybersecurity analyst. The women by the name of Nicole Enesse describes the different amounts of salary in different states, what competition is displayed in these states, and the importance of getting a job on…
Journal #10
This article discusses the importance of approaching technology vulnerability and social and behavioral aspects of cybersecurity threats. There is good information to follow in this article that teaches the importance of understanding what the social cybersecurity affects and offers to different strategy consequences. The social cybersecurity article touches on how technology today is more and…
Article Review #2
Howard Spencer March 24, 2024 Navigating the Digital Frontier: The Intersection of Cybersecurity Challenges and Young Adult Life Introduction This topic is about the era of young adults that has been dominated by digital landscapes and interconnected networks. This topic relates to the principles of social sciences because it gives great explained information that relates…
Journal #9
I scored a reliability good and got a 724. What I thought about the items in the scale was really good because I know friends/family members who would score very bad due to what I have witnessed on their social medias and how it made them who they are today. I think that different patterns…
Journal #8
How I think the media influences our understanding of cybersecurity is by using some real-life situations that happened years ago but bringing it into light years later in a film that relates to cybersecurity tactics. Also, the media uses systems that look familiar but uses them in a different way than how it is used…
Journal #6
three fake websites include Earaget.com, Cleanuli.com, and Lootgot.com and these three websites are fake websites. three real websites are Amazon.com. Spend less. Smile more., Digital Profiling: An Invasion of Privacy? What You Need To Know – PrivacyEnd, and HISTORY | Watch Full Episodes of Your Favorite Shows and the way you can tell between real…
Journal #5
C- create an application that protects a system against cybercrime. Y- Yacht software B- Biometric articles that allows navigation. E= Embezzlement detector R- recognizing issues within a system. S- Self evaluating thoughts on how the technique used made a difference. E- Encrypting private information. C- creating risk free program. U- uninstalling the program that removes…