Digital Forensics- Journal 15

Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Digital forensics investigators utilize social science in just about every aspect of their work, oftentimes without even knowing it. For example, they…

Article Review #1

Article Review #1 Inequality Against Women In Iraq Introduction: How does this article relate to the principles of social science?  The topic of gender-based discrimination and online harassment of women in Iraq is a scientific subject. It jumps deep into the interplay between gender, technology and society; and it unfolds and analyze the nature of…

Write Up – The Human Factor in Cybersecurity

First and foremost, I can’t have everything within a limited cybersecurity budget, so if I’m going to pick and choose what to spend my money on, that would be the right way to go about it. I want to get the basics down first. That’s going to be things like firewalls, anti-virus, secure configurations, that…

Write up- SCADA Systems

Systems such as transportation systems, water treatment plants, and power lines pose many problems. Cyber attacks, physical damage, natural disasters, and human error are some examples of these vulnerabilities. Providing real-time monitoring, monitoring and automation of industrial systems, SCADA (Supervisory Control and Data Acquisition) technologies are essential to mitigate these threats Security measures enacted such…

Write Up- The CIA Triad

According to the “What is the CIA Triad? Definition, Explanation, Examples” article by Wesley Chai, the CIA Triad stands for Confidentiality, integrity, and availability. The CIA Triad model was created to help organizations with their information security practices. (Chai, 2022) To assess your security protocols and equipment, the CIA triad offers a high-level, straightforward checklist….

Use of Policies-Journal 13

The bug bounty programs have been fully reviewed in the literature covering their entire journey from start to spread out. The review cites various research studies and data sources that demonstrate the financial benefits and effectiveness of bug bounty programs. The article examines the cost-effectiveness of bug bounties in comparison to conventional security approaches. It…

Cybersecurity Theories- Journal 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Two economic theories that relate to the letter are information asymmetry theory, which focuses on the distance between the platform provider and the organization in information…

Cybersecurity Analyst Relations to Social Behaviors- Journal 11

The video demonstrates the numerous components of lifestyles wherein a cybersecurity analyst’s work overlaps. The strength of alertness and proactive safety towards cyber attacks on the civil stage displays the motion to prioritize digital safety in more and more linked surroundings. The video also highlights the importance of conversation and teamwork to address hard demanding…

Summary on Social Cybersecurity- Journal 10

The article, Social Cybersecurity: “An Emerging National Security Requirement” by Lt. Col. David M. Beskow, U.S. Army & Kathleen M. Carley, PhD emphasizes the need to protect against threats posed by social media platforms to national security. The authors advocate holistic approaches that take into account mechanical perception and human behavior. They emphasize that social…

Media Influences About Cybersecurity- Journal 8

Social media not only change people’s perspective on cybersecurity by focusing on cybercrime issues and spreading more news about cybercrimes but also demand people to review the media narratives, the direction of being more certain for cybercrime dangers, and the enhancement of protection on digital properties to instruct public awareness and education. On the other…