“The Wrong Way to Use the Web”
After reading Andriy Slynchuk’s thoughts on internet activities that may be illegal, I think the five most serious violations are sharing passwords, addresses, or photos of others; faking your identity online; using other people’s internet connections; bullying; and trolling and using torrent services. Although all eleven things are illegal, I think those five are the…
“The Attack on Availability”
According to CSJTeam (2018), attacks on availability are all about preventing a target from accessing their data or systems. An attack I decided to discuss is the Colonial Pipeline attack that occurred in 2021. This is a good example of an attack on availability because it caused significant disruptions to gasoline delivery across the United…
“Awareness Over Tools”- Write-up
Based on the weekly readings and courses I have taken in cybersecurity, I am learning that cybersecurity is not only a technical issue; human error also plays a huge role. If I were a Chief Information Security Officer with a tight budget, my primary focus would be on providing proper training for my employees. Of…
“Protecting People, Not Just Systems: A New Approach to Cyber Defense” Journal 13
After reading the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,” I learned that social cybersecurity is not just about focusing on technical threats; it also involves how people are targeted through false information and fake content. Therefore, more is needed to protect the way people think and…
“Economic Theories vs Psychological Social Science” Journal 12
After reading the sample data breach notification letter, I believe the two related economic theories are Marxian and Keynesian. As learned in class, Marxian economic theory is mainly used by those in power to exploit those without power. As mentioned in class, the Keynesian economic theory believes that the “government should not intervene in the…
“Social Behaviors in a Cybersecurity Role”
After watching the video titled “What does a cybersecurity Analyst Do? Salaries, Skills, & Job Outlook,” the video explained the role of a Cybersecurity Analyst, which is the first line of defense during an attack and usually the first one to respond to an incident. As learned throughout this course, I know that social behavior…
“The impact of Social Cybersecurity”
I really enjoyed reading the article “A survey of Social Cybersecurity: Techniques for attack detection, evaluations, challenges, and the future prospects.” This article raised some good points about why social cybersecurity needs to be a focus today. For example, the article discussed human vulnerability, social media influencers, emerging threats, and the spread of misinformation. I…
The Connection Between Cybersecurity Careers & Social Science Research
Introduction According to cyberdegrees.org, Penetration testers, also called Pen-testers, help organizations identify and resolve security vulnerabilities affecting their digital assets and computer networks (Cyberdegrees, 2023). Other titles may be called Ethical hackers or Assurance validators; they often have the same duties as pen-testers. Usually, a Penetration testing team performs cyberattacks and other security breaches to…