Assignment Description: “Watch this video https://www.youtube.com/watch?v=Pf-JnQfAEew and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.” The digital forensics career described in the video is heavily related to several social sciences. There is an obvious…
Category: Journal Entries
Journal Entry 14
Assignment Description: “Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.” When looking at the list, the violation that stood out to me immediately was collecting information about…
Journal Entry 13
Assignment Description: “A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber…
Journal Entry 12
Assignment Description: “Read this: https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf and describe how two different economics theories and two different social sciences theories relate to the letter.” The first economic theory that connects to the sample breach letter is rational theory. This is because the company is making the rational choice to invest in working with a cybersecurity firm and…
Journal Entry 11
Assignment Description: “Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.” The role of a cybersecurity analyst relates to social behaviors because it connects to the human firewall aspects of a company and…
Journal Entry 10
Assignment Description: “Read this and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/“ A major takeaway I had from the article is how the ideas of social cybersecurity increase in severity and methods when going from discussing it in an organizational or business context to a government or military…
Journal Entry 9
Assignment Description: “Watch this Video: Social media and cybersecurity Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?” I scored a 2/9 on the Social Media Disorder Scale. I think that the scale…
Journal Entry 8
Assignment Description: “Watch this video and pay attention to the way that movies distort hackers.Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?“ I think media depictions on hacking and cybersecurity have a negative impact on thepublic perception of cybersecurity by overcomplicating the technology. For example, the James Bond clip…
Journal Entry 7
Assignment Description: “Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).” Meme 1:This image is about the optimism bias effect people have in online spaces, assuming that they themselves are not at risk or a profitable…
Journal Entry 6
Assignment Description: “Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.” Fake Example 1: bedbathclose .com This website…