Journal Entries
- Week 15 – Journal Entry 15After watching Davin Teo’s TEDx talk on digital forensics, I realized how closely digital forensics connects to the social sciences. Teo’s pathway into the field highlights a strong intersection between technology and understanding human behavior. Investigators must not only analyze… Continue Reading →
- DevSecOps and Detection Engineering:Integrating Social Science Principles intoCybersecurity Practices
- Article Review #2:Implementing information security controls: now or later?
- Week 13 – Journal Entry 14Some of the most serious internet violations outlined by Andriy Slynchuk include using unofficial streaming services, torrenting copyrighted material, cyberbullying, identity fraud, and searching for illegal content online. These actions are serious because they often result in significant harm, whether… Continue Reading →
- DISCUSSION Post: Protecting AvailabilityIn this discussion post, I am the CISO for a publicly traded company. What protections would I implement to ensure availability of your systems (and why)? As the Chief Information Security Officer (CISO) of a publicly traded company, ensuring system availability… Continue Reading →
- The Role of SCADA in Critical Infrastructure Security
- Understanding the CIA Triad and Authentication vs. Authorization
- Week 12 – Journal Entry 13The article, Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties, provides significant insights into bug bounty policies from both economic and social perspectives. Economically, the authors identified that security researchers exhibit low price elasticity… Continue Reading →
- Week 12- Journal Entry 12The “Sample Data Breach Notification” from Glasswasherparts.com relates clearly to two economic and two social science theories. Economic Theories: Social Science Theories:
- Article Review 1:Cybersecurity Politics in Egypt: Manipulating UncertaintyArticle
- Week 11 – Journal Entry 11The presentation of the cybersecurity analyst role reveals several compelling social themes that extend beyond technical defenses. Analysts are not only tasked with identifying and mitigating digital threats but must also understand human behavior and societal trends that contribute to… Continue Reading →
- Week 11 – Journal Entry 10The article on social cybersecurity offers a comprehensive examination of how cyber technology is reshaping modern conflict by targeting human behavior rather than just information systems. It highlights that, unlike traditional cybersecurity which defends against technical intrusions, social cybersecurity involves… Continue Reading →
- Week 10I scored a 3 on the Social Media Disorder Scale, which falls under the “risky” usage category. I think the items in the scale are very relevant, as they reflect some of the emotional and behavioral patterns that come with… Continue Reading →
- Week 8How the Media Influences Our Understanding of Cybersecurity Movies and TV shows often exaggerate or distort hacking, shaping public perception in misleading ways. Many portray hackers as typing furiously on a keyboard, bypassing security systems within seconds with flashy animations…. Continue Reading →
- Week 7When the users are happy that they get to work from home via vpn but it took the system administrator, network, and cyber teams 6 weeks to set the infrastructure up. This meme reflects the core of Human-Centered Cybersecurity by… Continue Reading →
- Week 6Fake websites often mimic legitimate ones to deceive users. Here are three examples: These fraudulent sites often employ tactics like URL manipulation, imitation of design elements, and enticing offers to mislead users. Vigilance, such as verifying URLs and ensuring secure… Continue Reading →
- Week 5For Money Financial gain is a primary driver for many cybercriminals. The article from HP Threat Research highlights how cybercriminals profit from illegal activities, using their earnings for various personal and illicit expenditures. The potential for substantial financial rewards makes… Continue Reading →
- Week 4Maslow’s Hierarchy of Needs is evident in how I integrate technology into my daily life. At the physiological level, a dependable internet connection and reliable devices help me manage coursework efficiently. My safety needs are met by using multi-factor authentication,… Continue Reading →
- Week 3Researchers can use PrivacyRights.org to analyze data breaches and find patterns in how they happen. Looking at past breaches helps identify common vulnerabilities and which industries are targeted the most. By studying this data, researchers can track trends in attack… Continue Reading →
- Week 2The principles of science which describe empiricism, determinism, parsimony, and objectivity are closely tied to cybersecurity. Empiricism involves relying on evidence, such as analyzing logs and data, to detect and respond to threats effectively. Determinism emphasizes cause-and-effect relationships, helping security… Continue Reading →
- Week1Cybersecurity architecture, defensive cybersecurity, and systems security analysis are essential components of the NICE Workforce Framework. Cybersecurity architecture focuses on designing secure systems and integrating protections to counter evolving threats. Defensive cybersecurity emphasizes detecting, mitigating, and responding to attacks to… Continue Reading →