Joshua Evans Professor Aslan CYSE 201S 4/7/24 Cybersecurity Career Professional Paper: Ethical Hacker Introduction Within today’s digital era, cybersecurity has become more and more of a necessity for society to operate. Ethical hacking is a cybersecurity career that is very important for identifying vulnerabilities within a defense method while also overall increasing the defenses of…
CYSE201S Article Review #2
Joshua Evans Professor Aslan CYSE 201S 3/24/24 Article Review #2: Cybersecurity for Internet Users with Limited English Introduction The article under review, titled “The Need for a Cybersecurity Education Program for Internet Users with Limited English Proficiency: Results from a Pilot Study”, looks at the general problems that could occur for internet users that are…
CYSE201S Article Review #1
Joshua Evans Professor Aslan CYSE 201S 2/11/24 Article Review #1: Cybercrime Laws in Iraq Introduction The article under review, titled “Cybercrime Laws in Iraq: Addressing Limitations for Effective Governance”, looks at the general policies in place within Iraq under a lens, with the goal of providing effective solutions to the current ineffective governance. The article…
CYSE 201S Week 15 Journal Entry
Devin Teo’s pathway into his career as a digital forensic investigator is very intriguing. One quote that he says in the Ted talk is that you don’t ever choose to go into the career, you either fall into or placed into it by others. For Devin, he originally was an accountant but eventually transitioned into…
CYSE 201S Week 13 Journal Entry
In my opinion, the most serious violation is collecting information from people younger than 13. I personally can’t think of any scenario where this isn’t something weird to do. Next, the illegal search terms presented in the article were very serious. Similar to the first violation, there is really no scenario that it makes sense…
CYSE 201S Week 12 Journal Entry 13
Bug bounty policies can be very important in strengthening cybersecurity defenses for an organization. By paying ethical hackers to exploit the weaknesses in their cybersecurity strategy, companies are able to analyze their defense systems and figure out where more resources need to be spent. Rather than an attacker figuring this out and the company losing…
CYSE 201S Week 12 Journal Entry 12
There are various economic and social science theories that relate to the letter “SAMPLE DATA BREACH NOTIFICATION.” The economic theory rational choice is present by the company working with a cybersecurity firm to remove the malware, which is them making a choice in their best interest. The marxist economic theory is present through the difference…
CYSE 201S Week 11 Journal Entry 11
A cybersecurity analyst plays a very important in ensuring stability in a technical environment and also relates to various social behaviors. For one, the job of a cybersecurity analyst highlights the need for human behavior and interaction in an otherwise digital space. A cybersecurity analyst needs to understand social aspects such as effective communication and…
CYSE 201S Week 11 Journal Entry 10
Social cybersecurity is an interesting human based approach on cybersecurity. The article states how social cybersecurity has become a requirement to consider when it comes to national security. Rather than trying to simply understand technology, social cybersecurity takes into account the humans behind the operations to gain a better understanding. I believe that social cybersecurity…
CYSE 201S Week 10 Journal Entry
Personally, out of the items in the scale the only one that I fit into was number 8. Sometimes social media can be a good way to get out of a bad mood by watching funny videos or something similar. The rest of the criteria were interesting but I do not believe that I would…