CYSE 201S

  • Module 14 Journal Entry

    Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo describes that he was put into digital forensics after trying out……


  • Career Paper

    Select a type of cybersecurity career and write a two-page paper describing how professionals in that career require and depend on social science research and social science principles in those careers.  Pay specific attention to the key concepts learned in class and demonstrate how those concepts are applied in the career you selected.   The focus……


  • Module 12 Journal Entry

    Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The first one that I find serious is “Sharing Passwords, Addresses, or Photos of Others,” because these can all……


  • Module 11 Journal Entry 2

    A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using……


  • Module 11 Journal Entry 1

    Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. One economic theory related to the sample letter is Rational Choice Theory. Rational Choice Theory in economic context means that people make choices in their best interest. It……


  • Module 10 Journal Entry 2

    Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. A cybersecurity analyst’s role does sound a lot like a cybersecurity help desk. The position has to do with the security……


  • Module 10 Journal Entry 1

    Read this and write a journal entry summarizing your response to the article on social cybersecurityhttps://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The problems behind information warfare run deep. There are issues at every level, from end-users, to platforms, to companies, and so on. Trying to combat online information campaigns would be difficult to accomplish in an effective and fair way….…


  • Article 2 Review

    The article review should focus on (1) how the topic relates to the principals of the social sciences; (2) the study’s research questions or hypotheses; (3) the types of research methods used; (4) the types of data and analysis done; (5) how concepts from the PowerPoint presentations relate to the article; (6) how the topic……


  • Module 9 Journal Entry

    Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? I scored a 0 on the scale. It makes sense to me that a lot of the items were about time. The fact……


  • Module 7 Journal Entry

    Review these photos through a cybersecurity human systems integration framework.Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your meme relates to Human Systems Integration. Human systems integration focuses on how people will use technology and tries to make it simple and smooth. The design decision to make……


  • Article 1 Review

    The article review should focus on (1) how the topic relates to the principals of the social sciences; (2) the study’s research questions or hypotheses; (3) the types of research methods used; (4) the types of data and analysis done; (5) how concepts from the PowerPoint presentations relate to the article; (6) how the topic……


  • Module 5 Journal Entry

    Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. • Entertainment https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/• Political https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms• Revenge https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/• Boredom https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/• Recognition https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/•……


  • Module 4 Journal Entry

    Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Starting from the bottom, I would say that physiological needs with technology would be having some way to interact and something to interact with. Such……


  • Module 3 Journal Entry

    Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. Researchers can use this information to analyze the frequency of different types of breaches over time. They could extrapolate the risk of insiders versus employees who make……


  • Module 2 Journal Entry

    Explain how the principles of science relate to cybersecurity Relativism provides that all things are related. Cybersecurity is included in pretty much all work nowadays because most use technology. Objectivity means studying topics in a value-free way. Cybersecurity has many ethical issues when it comes to dealing with cybercrime that shouldn’t be dictated by opinions….…


  • Module 1 Journal Entry

    Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.https://niccs.cisa.gov/workforce-development/nice-framework These areas seem very specialized so you would want to focus on only a few. One that popped out to me was……