Digital Forensics Investigator Career’s Relation to the Social Sciences

In this video, Davin Teo describes what a digital forensic investigator is. He talks about his career path, starting when he was an accountant, and how his experience in IT work began while he was simultaneously handling his accounting responsibilities. Ultimately, he became the director of the Forensic Technology team within Alvarez & Marsal Global…

Illegal Internet Activities

This blog post is about illegal activities on the Internet.  The author describes them as things that are “quite common, but may lead to unwanted consequences” (Slynchuk, 2021).  The top 5 activities that it discusses includes using unofficial streaming services, torrent services, copyrighted images, sharing personal information, and cyberbullying.  Unofficial streaming services essentially include any…

Summary of Journal Article about Bug Bounty Programs using HackerOne data

This article, “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,” by Kiran Sridhar and Ming Ng, discusses the use of bug bounty policies to improve cybersecurity.  They present bug bounty policies as something that relates cybersecurity to economics, because they’re based on cost/benefits principles.  This journal article is based…

A cybersecurity analyst job’s relation to social behaviors

In this video, Nicole describes what a cybersecurity analyst is.  Within this, she either mentions or refers to a few different social themes.  One of these is awareness; as a cybersecurity analyst, one would “be providing guidance and training for user awareness” (Enesse 2021).  Also, this includes being aware of the latest cyber threats, as…

Social Cybersecurity as a National Security Requirement

Today, I read the article “Social Cybersecurity: An Emerging National Security Requirement” by Lieutenant Colonel David M. Beskow and Dr. Kathleen M. Carley.  The article discusses the growing threat of social cybersecurity attacks and the need for a comprehensive approach to defending against them.  I was especially interested in the sections of the article that…

Social Media Disorder

The video attached to this assignment (youtube.com/watch?v=Zbqo7MGVElw) was interesting because it shows how addicted Dave is to the social media platform he’s using.  It doesn’t really matter what social media it is (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs); what matters is the realization of how much his social network means to…

Hacking in the Media

While technology has been an interesting subject in movies for a long time, cybersecurity in particular has become an increasingly popular topic in movies since sometime in the 80’s.  However, the media does not always necessarily portray the reality of the cybersecurity field, and what the best computer security habits and processes are.  There have…

Cybersecurity HSI Framework Meme Assignment

Meme 1: This meme relates to Human Systems Integration because it’s referring to how employees should be trained to be careful with all emails, especially those that are automatically categorized as spam. Meme 2: This image demonstrates how people should be aware of fake websites that attempt to imitate the real version of a website…

Fake Website Examples

Fake USPS Website Source: Trend Micro News What makes this fake website tricky is the fact that the attacker has added SSL encryption in order to add the “padlock” symbol.  However, this USPS Tracking number website is fake because the URL does not match the one on the real website (https://tools.usps.com/go/TrackConfirmAction_input).  Additionally, this source mentioned…