In this video, Davin Teo describes what a digital forensic investigator is. He talks about his career path, starting when he was an accountant, and how his experience in IT work began while he was simultaneously handling his accounting responsibilities. Ultimately, he became the director of the Forensic Technology team within Alvarez & Marsal Global…
Author: jdavi203
Career Paper – The Role of Social Science in Security Awareness and Training
Introduction to Security Awareness and Training SpecialistsIn the ever-evolving landscape of cybersecurity, security awareness and training (SAT) specialists play a pivotal role in safeguarding individuals and organizations from cyberattacks. Their expertise lies in educating and empowering individuals to protect themselves from cyber threats, a task which requires a deep understanding of human behavior and social…
Illegal Internet Activities
This blog post is about illegal activities on the Internet. The author describes them as things that are “quite common, but may lead to unwanted consequences” (Slynchuk, 2021). The top 5 activities that it discusses includes using unofficial streaming services, torrent services, copyrighted images, sharing personal information, and cyberbullying. Unofficial streaming services essentially include any…
Summary of Journal Article about Bug Bounty Programs using HackerOne data
This article, “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,” by Kiran Sridhar and Ming Ng, discusses the use of bug bounty policies to improve cybersecurity. They present bug bounty policies as something that relates cybersecurity to economics, because they’re based on cost/benefits principles. This journal article is based…
How Economic & Social Sciences Theories relate to a Sample Data Breach Notification
This sample breach letter was obtained from the Montana Department of Justice. It was reported on April 5, 2017, as a result of a data breach incident that occurred with a business named GlassWasherParts.com. There are a couple of economic theories that relate to the letter: There are also a couple of social sciences theories…
A cybersecurity analyst job’s relation to social behaviors
In this video, Nicole describes what a cybersecurity analyst is. Within this, she either mentions or refers to a few different social themes. One of these is awareness; as a cybersecurity analyst, one would “be providing guidance and training for user awareness” (Enesse 2021). Also, this includes being aware of the latest cyber threats, as…
Social Cybersecurity as a National Security Requirement
Today, I read the article “Social Cybersecurity: An Emerging National Security Requirement” by Lieutenant Colonel David M. Beskow and Dr. Kathleen M. Carley. The article discusses the growing threat of social cybersecurity attacks and the need for a comprehensive approach to defending against them. I was especially interested in the sections of the article that…
Article Review of “‘Elder Scam’ Risk Profiles”
Introduction and research questions/hypothesis“‘Elder Scam’ Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization,” written by Katalin Parti, Ph.D., and published in the International Journal of Cybersecurity Intelligence & Cybercrime in November of 2022, collected quantitative and qualitative data from 2,558 individuals who were remaining in the final sample of…
Social Media Disorder
The video attached to this assignment (youtube.com/watch?v=Zbqo7MGVElw) was interesting because it shows how addicted Dave is to the social media platform he’s using. It doesn’t really matter what social media it is (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs); what matters is the realization of how much his social network means to…
Hacking in the Media
While technology has been an interesting subject in movies for a long time, cybersecurity in particular has become an increasingly popular topic in movies since sometime in the 80’s. However, the media does not always necessarily portray the reality of the cybersecurity field, and what the best computer security habits and processes are. There have…