Thoughts About Daven Teo’s Pathway To Digital Forensics Video URL: https://www.youtube.com/watch?v=Pf-JnQfAEew&t=85s Digital Forensics is collecting, analyzing, and reporting data that can be used in a court of law. Daven Teo was put into digital forensics after he was given an incredible opportunity. The fact that he started as an accountant and decided to help out…
Author: iburd001
Journal Entry 9 – Week 10
Social Media Disorder Scale Score Ian Burd Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, Snapchat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs) in the past year. Answer the questions as honestly as possible. According to DSM, at least five (out of…
CYSE201 – Week 8 – Journal Entry 8
How Does The Media Influence Cybersecurity Understanding? Hacker Rates 12 Hacking Scenes in Movies and TV (YouTube) The media influences a lot about how cybersecurity, hacking and almost everything else is perceived by the public. Specifically regarding hacking, the media, such as TV shows, movies and even the news over exaggerates or dramatizes hacking. Some…
CYSE201 – Week 6 – Journal Entry 6
Fake Versus Real Websites One website that was faked was PayPal. The real PayPal is a great and reliable website, used almost like instant banking. It lets you send or receive money online, in person or at some participating stores. In late 2023, there was a fake website that mimicked PayPal extremely well. It looked…
CYSE201 – Week 5 – Journal Entry 5
Ranking The 7 Individual Motives Of Cybercrime Motive 1 – Multiple Reasons: There could be multiple reasons a cybercriminal chooses to commit cybercrime. Understanding these reasons could help transition them from a criminal to ethical hacker or something similar. For some it could be greed, revenge, political gain, or just entertainment or a challenge. Motive…
CYSE 201 – Week 4 Journal Entry 4
Maslow’s Hierarchy of Needs And How They Relate to My Experiences Maslow’s Hierarchy of Needs suggests that humans have a range of needs, including physiological, safety, belonging, esteem, and self-actualization. Technology meets all of these needs for me. It helps satisfy my physiological needs by offering relaxation after work through games or entertainment. For safety,…
CYSE 201 – Week 7 – Journal Entry 7
Human-Centered Cybersecurity Memes This is related to human-centered cybersecurity, because if they got proper training on how to reduce human – enabled errors, they would not have gotten their data breached. Human-centered cybersecurity focuses on teaching users about their responsibility in securing their own data. This is related to human – centered cybersecurity because the…
CYSE 201S – Week 1 Journal Entry 1
NICE Workforce Framework for Cybersecurity The NICE Framework represents some of the categories that all cybersecurity jobs fall into. There are a significant number of areas the NICE Framework covers. Protection and Defense is the area I would like to focus on for the start of my cybersecurity career. This is one of the more…
CYSE 201 – Week 2 Journal Entry 2
How The Principles of Science Relate to Cybersecurity There are four main principles of science; Empiricism, Determinism, Parsimony and Objectivity. They each relate to cybersecurity in one way or another. Empiricism emphasizes observation and evidence. One cannot rely on opinions working in cybersecurity. Determinism allows specialists to predict what might occur in cybersecurity, but said…
CYSE 201 – Week 3 Journal Entry 3
How Researchers Could Use Information About Data Breaches The Internet has a nearly endless amount of information that is constantly growing. This information that is publicly available can actually be quite helpful when it comes to cybersecurity. There are plenty of websites that show information about breaches or vulnerabilities. PrivacyRights.org has a massive amount of…