Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube I value Davin Teo’s perspective on the journey that led him to where he is now. His path into his career is very similar to the path that I have currently been on in my academic career. I find it interesting that he started in accounting,…
Category: CYSE 201S
Journal Entry 12: Review the article and write a paragraph describing the five most serious violations and why you think those offenses are serious.
What illegal things are you unwittingly doing on the internet? (clario.co) Out of the eleven things that Andriy Slynchuk stated may be illegal, I believe that five of them are much more serious than the others. The first act that I consider to be the most serious is faking your identity online. It may be…
Journal Entry 11: Read the article and describe how two different economics theories and two different social sciences theories relate to the letter.
Glasswasherparts.com_.pdf (dojmt.gov) Economic Theories: Social Science Theories:
Journal Entry 10: Read this article and write a journal entry summarizing your response to the article on social cybersecurity.
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The article gives a thorough examination of the evolving context of national security as social cybersecurity emerges. It highlights the enormous impact of cyber-mediated changes in human behavior, societal dynamics, and political landscapes. From this reading, it can be gathered that the acknowledgment of social cybersecurity as a significant topic goes beyond traditional cybersecurity, incorporating…
Journal Entry 9: Complete the Social Media Disorder scale. How did you score? What do you think about the items on the scale? Why do you think that different patterns are found across the world?
After viewing the nine questions in the Social Media Disorder Scale, I answered no to eight out of ten. The two questions that I answered yes to were: “…often felt bad when you could not use social media?” – I wouldn’t say it is often, but I usually entertain myself with social media so if…
Journal Entry 8: Watch the video and write a journal entry about how you think the media influences our understanding of cybersecurity.
https://www.youtube.com/watch?app=desktop&v=6BqpU4V0Ypk After watching the video, I noticed that it is common for the media to give a false representation of different aspects of hacking. In “Skyfall” and “Mr. Robot”, both scenes occurred much faster than they would in real-time. Also, a lot of media creates false images and terms to make the scenes “cooler” or…
Journal Entry 7: Review a photo through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your meme relates to Human Systems Integration.
By using an animal and a joke that relates to both humans and dogs, this meme serves as a humorous illustration of the challenges and efforts required in incorporating human factors into complex systems, highlighting the need for human-centric design in cybersecurity. As stated by Mansur (2018), people are not the weakest link in cybersecurity; the…
Journal Entry 6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
There are many ways to identify if a website is fake or not. A few include: To verify the validity of the website, you can check for things like: Some examples of authentic websites include: U.S. Food and Drug Administration (fda.gov) Welcome | USPS ODU – Old Dominion University (images from BBB Tip: How to…
Journal Entry 5: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Entertainment (5) – Hacking for entertainment can give individuals a major feeling of adrenaline. Furthermore, these individuals may find it fun or interesting to test their skills and capabilities to the fullest extent. As long as they’re having fun while doing so, the repercussions associated with getting caught aren’t a top priority in the decision…
Journal Entry 4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Physiological needs (food, water, warmth, rest) – Technology makes acquiring physiological needs much easier in society today. For example, there are many ways to have groceries delivered to you and technologies that can monitor sleep levels. I have used platforms like DoorDash and GrubHub to have meals delivered to my location which is extremely convenient…
Journal Entry 3: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
There is a lot of information regarding data breaches on the provided website. The data includes location, type of organization, type of hack, dates, and more. Information like this can help researchers identify trends, organizations that are potentially being targeted, and the types of data that are being compromised. Due to the website having breaches…
Journal Entry 2: Explain how the principles of science relate to cybersecurity.
The principles of science include relativism, determinism, parsimony, objectivity, empiricism, and ethical neutrality. Relativism (all things are related) – Many relationships in cybersecurity build upon the industry. These relationships include technology → creation of the cyberspace, healthcare relying on technological advancements, technological advancements → new ways to commit/solve crimes, etc. Determinism (behavior is caused, determined,…
Journal Entry 1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
After reviewing the NICE framework, I have noticed that I would like to focus my career on the collect and operate/operate and maintain categories. To elaborate further, the areas that caught my attention the most were cyber operations and network services. For a future career, I can see myself undergoing several tasks including installing, configuring,…