Cybersecurity and Digital Forensics 2025

Author jcran011

Journal #13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true This is a study on bug bounties, which reward gig economy security researchers for finding flaws in corporate code, and demonstrates how economical these initiatives are. The study discovered that there is no discernible effect on the number of… Continue Reading →

Journal #12: Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

There are 3 economic theories mentioned in module 11 that work together and apply to this letter. These theories are Laissez-fare economic theory, rational choice, and Marxian economic theory. The rational choice theory states that businesses make choices that occur… Continue Reading →

Module 10: Identify two research questions that researchers might address related to the social aspects of cybersecurity.

In Module 3 PowerPoint there were 2 common experiment questions. • Do certain interventions increase security behaviors by computer users?• Do certain characteristics of individuals increase the likelihood of unsafe practiceswhen using technology?

Module 9: In this module you learnt about vulnerabilities in many aspects of Information Technology. In this modern era IOT or Internet of Things is gaining popularity. However the question is are they secure? Or vulnerable? Watch this video on “Internet of Things Security” and give your opinions on the question above. The speaker puts forward an example of how he unlocked a smart padlock using the Bluetooth feature of a smartphone. Do some research and provide another example of how an IOT device had been compromised using a vulnerability.

This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked…. Continue Reading →

Journal #11: Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

A cybersecurity analyst needs to understand both technology and people. They use psychology to predict and stop cybercriminals who trick others into sharing information. This job requires working well with others and being a part of a team to keep… Continue Reading →

Module 9: Watch this video about a 12-year-old cyber security expert.  Pay attention to how he has embedded himself into the cybersecurity culture.  Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise.  On the discussion board post an entry about how the video relates to something you read for this class – either from the readings or this module.

This video shocked me for many reasons. One reason is that a 12-year-old was able to manipulate a bear meant to connect family and turned malicious. Module 6 in classes briefly discussed trust with the web and this elaborates on… Continue Reading →

Journal #10: Read this article and write a journal entry summarizing your response to the article on social cybersecurity

To defend the security and sustain American influence abroad, leaders have to understand the upcoming discipline of social cybersecurity and how it impacts their force, nation, and values. Changes in communication and information flows have enabled the social cyberthreat: technology has… Continue Reading →

Journal #9: Watch the video and complete the Social Media Disorder scale. How did you score?

On a scale of 0-9, I scored a 2. The reason for this score is that using a distraction to help focus on another topic is not always negative. If an escape is needed to calm down, it does not… Continue Reading →

Module 7: The learning material briefly explained “Stuxnet”. The video below gives an overview of the attack. Watch it and connect it with the topics you learned this week. Also provide your views on why Stuxnet is actually complicated and any other interesting articles you found online.

In this class for Module 7, the class learned about the National Vulnerability Database which gives a score called CVSS which stands for Common Vulnerability Scoring System. This system lists the vulnerabilities found in databases in a score that reflects… Continue Reading →

Journal #8: After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity.

The media really affects how we see cybersecurity by how it talks about cyberattacks and data breaches. They often make big, dramatic stories out of them, making it seem like these incidents are always super dangerous. But they don’t always… Continue Reading →

Week 7: Please read the KMPG report in the link. Which of the five mistakes, do you think, is more common in an organization/business of your choice? Which of the three options would be more challenging in taking action (risk assessment, changing organizational culture or determining budget?

I believe based on the article the top two cyber security mistakes are “We have to achieve 100 percent security” and “When we invest in best-of-class technical tools, we are safe”. These two mindsets can be dangerous. This can lead… Continue Reading →

Module 6: Watch this video titled “Can we make Encryption that’s unbreakable?” The speaker shows a diagram at (2:09) of the records stolen since 2013 from the many famous companies around the world. What are your thoughts about it and the general idea of making encryption “Foolproof”? Share some other articles you searched online that gives any detailed information on the many attacks on those companies.

This was very interesting to watch. Seeing the number of breaches that have occurred since 2013 and the businesses used daily was shocking. I find the idea of battling quantum computers with quantum science intriguing. It reminds me of the… Continue Reading →

Journal #7: Create a meme, explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.

Human integration in cybersecurity to me means how human behavior has influenced or changed technology/cyber. This is essential in the creation of cyber mechanisms as it can reduce human-made mistakes and increase an institution’s performance. Meme 1 (Top left corner):… Continue Reading →

Module 5: Watch this TED talk. The presenter talks about his own 5 laws of cybersecurity. Do you agree with them all? Do you propose any changes you would like to bring in?

The first law mentioned, “If there is a vulnerability, It will be exploited.” is something I agree with. Hackers find any vulnerability they can to reach their end goal. Law 2, “everything is vulnerable in some way.” is correct. Even… Continue Reading →

Week 2: Where should the power and responsibility of national governments begin and end in cyberspace? Where does the responsibility of private firms begin and end in cybersecurity?

The government strives to protect the people and that is their responsibility. Privacy is important, but the security involved is essential. Just as within the real world, there are laws to protect the people while maintaining freedom. The people should… Continue Reading →

« Older posts Newer posts »

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑