In this video, Davin Teo describes what a digital forensic investigator is. He talks about his career path, starting when he was an accountant, and how his experience in IT work began while he was simultaneously handling his accounting responsibilities. Ultimately, he became the director of the Forensic Technology team within Alvarez & Marsal Global…
Category: Journal Entries
Illegal Internet Activities
This blog post is about illegal activities on the Internet. The author describes them as things that are “quite common, but may lead to unwanted consequences” (Slynchuk, 2021). The top 5 activities that it discusses includes using unofficial streaming services, torrent services, copyrighted images, sharing personal information, and cyberbullying. Unofficial streaming services essentially include any…
Summary of Journal Article about Bug Bounty Programs using HackerOne data
This article, “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,” by Kiran Sridhar and Ming Ng, discusses the use of bug bounty policies to improve cybersecurity. They present bug bounty policies as something that relates cybersecurity to economics, because they’re based on cost/benefits principles. This journal article is based…
How Economic & Social Sciences Theories relate to a Sample Data Breach Notification
This sample breach letter was obtained from the Montana Department of Justice. It was reported on April 5, 2017, as a result of a data breach incident that occurred with a business named GlassWasherParts.com. There are a couple of economic theories that relate to the letter: There are also a couple of social sciences theories…
A cybersecurity analyst job’s relation to social behaviors
In this video, Nicole describes what a cybersecurity analyst is. Within this, she either mentions or refers to a few different social themes. One of these is awareness; as a cybersecurity analyst, one would “be providing guidance and training for user awareness” (Enesse 2021). Also, this includes being aware of the latest cyber threats, as…
Social Cybersecurity as a National Security Requirement
Today, I read the article “Social Cybersecurity: An Emerging National Security Requirement” by Lieutenant Colonel David M. Beskow and Dr. Kathleen M. Carley. The article discusses the growing threat of social cybersecurity attacks and the need for a comprehensive approach to defending against them. I was especially interested in the sections of the article that…
Social Media Disorder
The video attached to this assignment (youtube.com/watch?v=Zbqo7MGVElw) was interesting because it shows how addicted Dave is to the social media platform he’s using. It doesn’t really matter what social media it is (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs); what matters is the realization of how much his social network means to…
Hacking in the Media
While technology has been an interesting subject in movies for a long time, cybersecurity in particular has become an increasingly popular topic in movies since sometime in the 80’s. However, the media does not always necessarily portray the reality of the cybersecurity field, and what the best computer security habits and processes are. There have…
Cybersecurity HSI Framework Meme Assignment
Meme 1: This meme relates to Human Systems Integration because it’s referring to how employees should be trained to be careful with all emails, especially those that are automatically categorized as spam. Meme 2: This image demonstrates how people should be aware of fake websites that attempt to imitate the real version of a website…
Fake Website Examples
Fake USPS Website Source: Trend Micro News What makes this fake website tricky is the fact that the attacker has added SSL encryption in order to add the “padlock” symbol. However, this USPS Tracking number website is fake because the URL does not match the one on the real website (https://tools.usps.com/go/TrackConfirmAction_input). Additionally, this source mentioned…