CYSE201 – Journal Entry 14 – Week 13

Illegal Things Internet Users Do Without Realizing Article URL: https://clario.co/blog/illegal-things-you-do-online/ There are a lot of different things that are illegal on the internet that many people do not know are illegal. Some things are more serious than others. According to an article written by  Andriy Slynchuk, who describes eleven different things internet users do without…

CYSE201 – Journal Entry 13 – Week 12

Bug Bounty Policies and Economics ARTICLE URL: https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Bug bounties could be extremely helpful to an organization, in more ways than one. Itallows them to learn about vulnerabilities they may have missed in the past. This means it cansignificantly reduce the cost of data breaches, security training or recovery. Some bug bountiescan be taken up…

CYSE201 – Journal Entry 12 – Week 12

Economic Theories and Social Sciences in Breach Notification ARTICLE URL: https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf The Laissez-faire economic theory explains that the government should not interfere with the economy, except to protect individuals inalienable rights. Some would argue that privacy is an inalienable right. The fact that the customers privacy was breached calls for government intervention, due to potential…

CYSE201 – Journal Entry 11 – Week 11

Cybersecurity Analyst and Social Themes The job of a cybersecurity analyst involves several social themes and behaviors. Some rely heavily on trust, responsibility and ethical decision making. A cybersecurity analyst works to protect an organization or business, and is the first line of defense for security in a network. You need to have critical thinking,…

CYSE201 – Journal Entry 10 – Week 11

A Response To A Social Cybersecurity Article It is no surprise to me that social cybersecurity will affect warfare, both conventional and unconventional. As large and as fast as it is growing, cyberwarfare does not seem far off. The article states that social cybersecurity is “an emerging scientific area focused on the science to characterize,…

CYSE201 – Article Review #2

Article URL: https://vc.bridgew.edu/cgi/viewcontent.cgi?article=1185&context=ijcic Introduction Technology has changed the world in a myriad of ways, some good and some bad. It seems that every day a new technology is created to innovate our lives. Every day cybercriminals and hackers create new ways to commit cybercrime, making it so that cybersecurity professionals have to stay updated, and…

CYSE201 – Journal Entry 9 – Week 10

Social Media Disorder Scale Score Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, Snapchat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs) in the past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine)…

CYSE201 – Week 8 – Journal Entry 8

How Does The Media Influence Cybersecurity Understanding? Hacker Rates 12 Hacking Scenes in Movies and TV (Youtube) The media influences a lot about how cybersecurity, hacking and almost everything else is perceived by the public. Specifically regarding hacking, the media such as TV shows, movies and even the news over exaggerates or dramatizes hacking. Some…

CYSE201 – Week 5 – Journal Entry 5

Ranking The 7 Individual Motives Of Cybercrime Motive 1 – Multiple Reasons:  There could be multiple reasons a cybercriminal chooses to commit cybercrime. Understanding these reasons could help transition them from a criminal to ethical hacker or something similar. For some it could be greed, revenge, political gain, or just entertainment or a challenge. Motive…

CYSE 201 – Week 4 Journal Entry 4

Maslow’s Hierarchy of Needs And How They Relate to My Experiences Maslow’s Hierarchy of Needs suggests that humans have a range of needs, including physiological, safety, belonging, esteem, and self-actualization. Technology meets all of these needs for me. It helps satisfy my physiological needs by offering relaxation after work through games or entertainment. For safety,…