Jasmyn Wilhelm

Cybersecurity and Digital Forensics 2025

Page 2 of 8

Module #2: Do people bear some of the responsibility for their victimization if they maintain a lifestyle that contributes to the chances of becoming a crime victim? That is, should we “blame the victim”?

I believe this question may provide interesting responses. If we ‘blame the victim,’ we are essentially suggesting that simply entering a bank makes us responsible for being involved in a bank robbery, or that posting on social media means we… Continue Reading →

Module #1: Would you answer honestly if a national crime survey asked you about your criminal behavior, including drinking and drug use? If not, why not? If you would not answer honestly, do you question the accuracy of self-report surveys?

If the survey were based on previous crimes I was convicted of, I would answer honestly even though my record is clean. However, if it covered my entire life experience, I would not participate. Although I have nothing to hide,… Continue Reading →

Module #2: Introduction to Interdisciplinary Studies

References: Repko, A. F. & Szostak, R. (2021). Interdisciplinary research: Process and theory (4th ed.). SAGE Publications, Inc.

Journal #15: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

The speaker discussed how the career of digital forensics ‘fell into his lap’ per se. Davin Teo started as an accountant and moved into the IT world due to an opening. He then proceeded to do both careers eventually completing… Continue Reading →

Week 15: In your opinion, what is the top cybersecurity concern the world will face in the following decade?

In the next ten years, the biggest cybersecurity worry will be more advanced cyberattacks using new technologies like AI, quantum computing, and IoT. These new technologies can help protect against attacks but also make it easier for cyber criminals to… Continue Reading →

Module 14: Read the brief article about “SQL Injection loses #1 spot as most dangerous attack technique”. The article mentions a new technique used to rank the most dangerous vulnerabilities. At the end it mentions the top 3 vulnerabilities. Research on the top vulnerability listed and provide any other articles you came across about it.

This vulnerability of “Improper Restriction of Operations within the Bounds of a Memory Buffer” occurs when an offender operates outside the intended buffer allowing them to read, write, or execute at the outside location. Many articles have been written about… Continue Reading →

Module 14: Watch this video and explain what it has to do with routine activities theory.

The routine theory believes that crime occurs when 3 activities happen at the same time. The 3 activities are motivated offenders, suitable targets, and the absence of capable guardians. This video explains that one family fell victim to an online… Continue Reading →

Module 13: Watch this video on “Cyber warfare is everywhere”. He explains how human warfare evolved through the ages and how cyberwarfare is a culmination of it all. Something new he talks about is the concept of “Kinetic Cyberwarfare” and provided “Stuxnet” as an example. Research on other examples and provide your feedback.

The definition of Kinetic Cyberwarfare is when someone causes direct or indirect harm such as injury or damage to a crucial system through vulnerabilities. This concept has already happened to hospitals, power plants, and even oil companies. An example other… Continue Reading →

Module 13: Why do you think individuals don’t report cybercrime victimization?

I believe some may not report is that they do not know how to go about reporting. Before exploring the world of cybersecurity I used to think “Well what would the police even do?” and I believe others will think… Continue Reading →

Module 12: Watch this Ted talk on “Governments don’t understand cyber warfare. We need hackers”. How much do you agree with the speaker? Provide an additional article supporting your thoughts.

Many people argue that mainstream approaches to cybersecurity are insufficient in addressing the rapidly evolving world of cyber threats. Hackers with ethical/white hat hackers have valuable insights into vulnerabilities and potential attacks that could be exploited by offenders. Ethical hackers… Continue Reading →

Module 11: Read the article What Would a CYBERCOM-NSA Split Mean? This article was published in 2016. Research on this topic and find out whether there was a split between them. Were there any consequences? Also provide any interesting articles that support your findings.

https://www.fifthdomain.com/home/2016/10/10/what-would-a-cybercom-nsa-split-mean/ As of March of 2024, the split between U.S. Cyber Command (CYBERCOM) and the National Security Agency (NSA) was mentioned but has not been fully implemented. In 2016 when this article was written, there were discussions about separating the… Continue Reading →

Module 11: What does economics have to do with cybersecurity?

The best way to view cybersecurity from an economic point of view is through a cost-benefit analysis. This analysis can help businesses or organizations determine the best way to reduce the risk of cyber incidents and spending costs. Budgets can… Continue Reading →

Week 11: In your opinion, what are the benefits of looking at cybersecurity from an economics perspective?

The best way to view cybersecurity from an economic point of view is through a cost-benefit analysis. This analysis can help businesses or organizations determine the best way to reduce the risk of cyber incidents and spending costs. Budgets can… Continue Reading →

Journal #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

My top 5 list of most serious crimes online from the provided chart: 1. This may seem like an obvious choice, and it should be. Collecting this data without parental consent is very illegal and violates the Children’s Online Protection… Continue Reading →

Module 10: Watch this video on “The Humanity behind Cybersecurity Attacks”. The speaker talks about how he was a kicker for his school football team. He talks about various factors that might affect his kicking and making that score. The same analogy goes to the cybersecurity professionals defending against attackers. These professionals do not always have the perfect conditions to defend against attacks. Provide your opinions on this statement, and ways in which the “Humans Behind cybersecurity” (both attackers and defenders) get around each other.

Nobody is perfect. This is something everyone knows. Whether it is knowing information, bad days from illness or a live event, conflicts, and the list goes on. These factors can affect our thoughts and abilities. There is never a perfect… Continue Reading →

« Older posts Newer posts »

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑