Cybersecurity and Digital Forensics 2025

Category CYSE 201S Discussions

Module 14: Watch this video and explain what it has to do with routine activities theory.

The routine theory believes that crime occurs when 3 activities happen at the same time. The 3 activities are motivated offenders, suitable targets, and the absence of capable guardians. This video explains that one family fell victim to an online… Continue Reading →

Module 13: Why do you think individuals don’t report cybercrime victimization?

I believe some may not report is that they do not know how to go about reporting. Before exploring the world of cybersecurity I used to think “Well what would the police even do?” and I believe others will think… Continue Reading →

Module 11: What does economics have to do with cybersecurity?

The best way to view cybersecurity from an economic point of view is through a cost-benefit analysis. This analysis can help businesses or organizations determine the best way to reduce the risk of cyber incidents and spending costs. Budgets can… Continue Reading →

Module 10: Identify two research questions that researchers might address related to the social aspects of cybersecurity.

In Module 3 PowerPoint there were 2 common experiment questions. • Do certain interventions increase security behaviors by computer users?• Do certain characteristics of individuals increase the likelihood of unsafe practiceswhen using technology?

Module 9: Watch this video about a 12-year-old cyber security expert.  Pay attention to how he has embedded himself into the cybersecurity culture.  Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise.  On the discussion board post an entry about how the video relates to something you read for this class – either from the readings or this module.

This video shocked me for many reasons. One reason is that a 12-year-old was able to manipulate a bear meant to connect family and turned malicious. Module 6 in classes briefly discussed trust with the web and this elaborates on… Continue Reading →

Module 6: Watch this video and pay attention to what the biggest risk of cyber threats are. After watching the video, post an entry in the discussion board describing what you think about the “human firewall”.

I love how he explained this topic and showed just how easy it can be. He has a great point that humans can be the greatest weakness. People talk to strangers they find things to relate to others. Whether this… Continue Reading →

Module 5: Identify which theories you think best explain cybercrime and discuss what you like about that theory.

I believe that cognitive theories are most closely related to cybercrime. People who rob banks do need the money and most do not tend to hurt people in some theories it is that they believe the bank has money and… Continue Reading →

Module 4: “Apply the phrase victim precipitation to cyber victimization”.

Cyber victimization happens very commonly in today’s day and age. Recently, there has been a spike where many people “hype” up someone in the media and praise them, but then suddenly something is done that turns the users away. In… Continue Reading →

Module 2: What do you think about the principle of determinism as it relates to computer hacking?

Clarifying information:  Definition:  Computer hacking is broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. Various state and federal laws govern computer hacking. The federal Computer Fraud and Abuse Act provides details as follows:  definitions.uslegal.com/c/computer-hacking/ From… Continue Reading →

Module 1: Describe the top three careers of cyber social science fields that you would be interested in considering. What is it about those jobs that you find interesting? 

One of the careers that I would consider is an ethical hacker/ penetration tester. Using my skills for good and understanding an attacker’s motives would be beneficial and intrigue me.  Computer Forensics analysis is another field at the top of… Continue Reading →

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑