After watching the video, I learned how the speaker’s path to becoming a digital forensics investigator ties into social sciences in many ways. His job involves understanding not just the technical side of cybercrime, but also the behavior and intentions of the people behind it. That means learning how people think, why they commit certain…
Category: CYSE201S Journal
Journal Entry #14
After reading the article by Andriy Slynchuk, I think the five most serious online violations are cyberbullying, hacking, piracy, identity theft, and spreading malware. Cyberbullying can seriously affect someone’s mental health and even lead to tragic outcomes. Hacking is a major offense because it invades people’s privacy and can damage important systems. Piracy may seem…
Journal Entry #13
After reading the article, I learned that bug bounty policies are a smart way for companies to protect themselves by paying ethical hackers to find vulnerabilities before bad actors do. The literature review showed that companies are starting to realize how cost-effective these programs are compared to dealing with a major breach after it happens….
Journal Entry #12
After reading the sample breach letter, I can see how economics and social sciences relate to it. One economic theory that connects is cost-benefit analysis because the company had to weigh the cost of sending out notifications against the possible legal or trust issues if they didn’t. Another economic theory is supply and demand since…
Journal Entry #11
After watching the video, I noticed that being a cybersecurity analyst relates a lot to social behaviors. One big theme is trust, because analysts are trusted to protect personal and company information. Another social theme is teamwork. Analysts often have to work with different departments and communicate clearly to solve problems. Understanding human behavior is…
Journal Entry #10
After reading the article on social cybersecurity, I realized how important it is to look at cybersecurity from both a technical and social point of view. The article explained how threats aren’t just about hacking systems but also about targeting people’s beliefs and behaviors online. Things like fake news, misinformation, and online influence campaigns are…
Journal Entry #9
I scored a 2 on the Social Media Disorder Scale, which means I fall into the risky usage range. The only two “yes” answers I gave were for neglecting other activities and having occasional arguments related to my use. I think the items in the scale are good because they ask about more than just…
Journal Entry #8
After watching the video, I realized that movies often give people the wrong idea about what hackers and cybersecurity really look like. In movies, hackers are usually shown typing super fast in dark rooms, breaking into government systems in seconds, and doing things that aren’t realistic. This can make cybersecurity seem like it’s only for…