Module 14 Journal Entry

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo describes that he was put into digital forensics after trying out…

Career Paper

Select a type of cybersecurity career and write a two-page paper describing how professionals in that career require and depend on social science research and social science principles in those careers.  Pay specific attention to the key concepts learned in class and demonstrate how those concepts are applied in the career you selected.   The focus…

Module 12 Journal Entry

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The first one that I find serious is “Sharing Passwords, Addresses, or Photos of Others,” because these can all…

Module 11 Journal Entry 2

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…

Module 11 Journal Entry 1

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. One economic theory related to the sample letter is Rational Choice Theory. Rational Choice Theory in economic context means that people make choices in their best interest. It…

Module 10 Journal Entry 2

Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. A cybersecurity analyst’s role does sound a lot like a cybersecurity help desk. The position has to do with the security…