Cybersecurity and Digital Forensics 2025

Author jcran011

Policy Analysis Papers

Policy Analysis Paper Topic. For the assignments below you will need to select a topic that needs to be approved by the instructor. Once you choose a policy/strategy for the four policyanalysis papers and it was approved by the instructor, you… Continue Reading →

Article Reviews

On two occasions during the semester, students will write an article review using social science cybersecurity studies and should follow the rubric closely.    Article 1 review will be derived from a scholarly journal. The reviews should focus on (1) how the topic… Continue Reading →

Journal #6: How can you spot fake websites? Compare three fake websites(don’t access those sites, of course)to three real websites. What makes the fake websites fake?

*Please do not click on any links in this article* Fake websites seem easy to catch, but that is not always true. The difference between a fake and real website can be as simple as 1 added letter to the… Continue Reading →

Module 6: Watch this video and pay attention to what the biggest risk of cyber threats are. After watching the video, post an entry in the discussion board describing what you think about the “human firewall”.

I love how he explained this topic and showed just how easy it can be. He has a great point that humans can be the greatest weakness. People talk to strangers they find things to relate to others. Whether this… Continue Reading →

Module 4: Pick one of the following three articles about attacks on vehicle security:

Answer both of the following questions: Many security companies have top-of-the-line software, yet cyberattacks still happen every day even if they are not reported. I don’t think anyone is ever 100% safe. I do think you can greatly decrease the… Continue Reading →

Journal #5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

References: Carole, J. (2021, April 8). Sex, Drugs and Toilet Rolls: How Cybercriminals Spend Their Money (infographic). HP Wolf Security. https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ Corfield, G. (2021, June 30). 8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019… Continue Reading →

Module 5: Identify which theories you think best explain cybercrime and discuss what you like about that theory.

I believe that cognitive theories are most closely related to cybercrime. People who rob banks do need the money and most do not tend to hurt people in some theories it is that they believe the bank has money and… Continue Reading →

Module 3: Watch this video. This was a TED talk by Danny Hills. The topic was “The internet could crash. We need a Plan B” According to him, “From each according to their ability to each according to their need” was the concept of IP in the olden days. Discuss how it has changed in the present, preferably giving examples like he has talked about (Router bug causing flight to ground). Also, feel free to comment on your favorite parts of the video.

What I understood from this talk, is discussed how the world has become dependent on technology. In times when the internet is down, panic is involved. The internet leaves more vulnerability as banking, taxes, etc are primarily used online now…. Continue Reading →

Journal #4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

There are 5 levels to Maslow’s Hierarchy of Needs. From top to bottom, the levels are self-actualization, esteem, love and belonging, safety needs, and physiological needs. I strive to work hard in everything I do and pushing myself to study… Continue Reading →

Module 4: “Apply the phrase victim precipitation to cyber victimization”.

Cyber victimization happens very commonly in today’s day and age. Recently, there has been a spike where many people “hype” up someone in the media and praise them, but then suddenly something is done that turns the users away. In… Continue Reading →

Module 2: We have learnt a few protocols in this module like HTTP, FTP, SMTP. Search for any other well-known protocols and answer the following.

Reference: IBM warns of rising VoIP cyber-attacks. CSO Online. (2016, December 1). https://www.csoonline.com/article/559047/ibm-warns-of-rising-voip-cyber-attacks.html

Journal #3: Visit the website below to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

This site gives various statistics and laws regarding privacy rights and gives the most recent information on data breaches. Previous studies and documents are posted giving aspiring researchers insight and plans. Understanding and adding additional information regarding these breaches can… Continue Reading →

Module 2: What do you think about the principle of determinism as it relates to computer hacking?

Clarifying information:  Definition:  Computer hacking is broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. Various state and federal laws govern computer hacking. The federal Computer Fraud and Abuse Act provides details as follows:  definitions.uslegal.com/c/computer-hacking/ From… Continue Reading →

Journal #2: Explain how the principles of science relate to cybersecurity.

There are seven principles of science topics: relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. The principle of relativism explains how all things are related to one another. An example of this can be technology leading to cyberspace, new crime… Continue Reading →

Module 1: Describe the top three careers of cyber social science fields that you would be interested in considering. What is it about those jobs that you find interesting? 

One of the careers that I would consider is an ethical hacker/ penetration tester. Using my skills for good and understanding an attacker’s motives would be beneficial and intrigue me.  Computer Forensics analysis is another field at the top of… Continue Reading →

« Older posts Newer posts »

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑