Cybersecurity and Digital Forensics 2025

Category CYSE 201S Journal Entries

Journal #15: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

The speaker discussed how the career of digital forensics ‘fell into his lap’ per se. Davin Teo started as an accountant and moved into the IT world due to an opening. He then proceeded to do both careers eventually completing… Continue Reading →

Journal #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

My top 5 list of most serious crimes online from the provided chart: 1. This may seem like an obvious choice, and it should be. Collecting this data without parental consent is very illegal and violates the Children’s Online Protection… Continue Reading →

Journal #13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true This is a study on bug bounties, which reward gig economy security researchers for finding flaws in corporate code, and demonstrates how economical these initiatives are. The study discovered that there is no discernible effect on the number of… Continue Reading →

Journal #12: Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

There are 3 economic theories mentioned in module 11 that work together and apply to this letter. These theories are Laissez-fare economic theory, rational choice, and Marxian economic theory. The rational choice theory states that businesses make choices that occur… Continue Reading →

Journal #11: Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

A cybersecurity analyst needs to understand both technology and people. They use psychology to predict and stop cybercriminals who trick others into sharing information. This job requires working well with others and being a part of a team to keep… Continue Reading →

Journal #10: Read this article and write a journal entry summarizing your response to the article on social cybersecurity

To defend the security and sustain American influence abroad, leaders have to understand the upcoming discipline of social cybersecurity and how it impacts their force, nation, and values. Changes in communication and information flows have enabled the social cyberthreat: technology has… Continue Reading →

Journal #9: Watch the video and complete the Social Media Disorder scale. How did you score?

On a scale of 0-9, I scored a 2. The reason for this score is that using a distraction to help focus on another topic is not always negative. If an escape is needed to calm down, it does not… Continue Reading →

Journal #8: After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity.

The media really affects how we see cybersecurity by how it talks about cyberattacks and data breaches. They often make big, dramatic stories out of them, making it seem like these incidents are always super dangerous. But they don’t always… Continue Reading →

Journal #7: Create a meme, explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.

Human integration in cybersecurity to me means how human behavior has influenced or changed technology/cyber. This is essential in the creation of cyber mechanisms as it can reduce human-made mistakes and increase an institution’s performance. Meme 1 (Top left corner):… Continue Reading →

Journal #6: How can you spot fake websites? Compare three fake websites(don’t access those sites, of course)to three real websites. What makes the fake websites fake?

*Please do not click on any links in this article* Fake websites seem easy to catch, but that is not always true. The difference between a fake and real website can be as simple as 1 added letter to the… Continue Reading →

Journal #5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

References: Carole, J. (2021, April 8). Sex, Drugs and Toilet Rolls: How Cybercriminals Spend Their Money (infographic). HP Wolf Security. https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ Corfield, G. (2021, June 30). 8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019… Continue Reading →

Journal #4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

There are 5 levels to Maslow’s Hierarchy of Needs. From top to bottom, the levels are self-actualization, esteem, love and belonging, safety needs, and physiological needs. I strive to work hard in everything I do and pushing myself to study… Continue Reading →

Journal #3: Visit the website below to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

This site gives various statistics and laws regarding privacy rights and gives the most recent information on data breaches. Previous studies and documents are posted giving aspiring researchers insight and plans. Understanding and adding additional information regarding these breaches can… Continue Reading →

Journal #2: Explain how the principles of science relate to cybersecurity.

There are seven principles of science topics: relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. The principle of relativism explains how all things are related to one another. An example of this can be technology leading to cyberspace, new crime… Continue Reading →

Journal #1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

One specialty that appeals to me most is digital forensics. This area intrigues me due to collecting the evidence after the attack and maintaining/preserving this for the officials to assist in the investigation. Looking into what can be found left… Continue Reading →

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑