Across the world many still argue about human rights, but how does this connect to the digital world? Digital human rights is an interesting topic as some countries allow their governments full control over their internet and what can be seen or used. In other countries like the United States, the people have more control…
Category: CYSE 201S
Article review 1
In today’s digital age social networking sites have become a popular form of communication and how people share information. These platforms also expose users to many risks, including cybercrime. The article, “Cybercrime Risk Fear Among University Students’ Social Networking Sites” written by Abdulnaser Fakhrou and Mahmoud Ali Moussa, explores the prevalence of cybercrime anxiety among…
Career Paper
Imagine that an employee clicks on an email that looks almost exactly like one from the CEO, only to find out that they just exposed sensitive company information. This is where a security awareness trainer comes into play. A security awareness trainer is a role within a company that develops and trains members of an…
Journal entry 15
I think it’s interesting the way that he fell into digital forensics. In the video, he said that you find digital forensics by either being put there or you discover it yourself. I think this is interesting that it’s a 50/50 thing, most careers people know you can get some sort of degree or go…
Journal entry 14
Out of the 11 illegal things people unknowingly do online, I think the top 5 worst ones are, faking your identity, sharing password addresses or photos of others, collecting information about children, recording a VoIP call without consent, and illegal searches on the internet. I chose all of these due to their security and privacy…
Journal entry 13
The article examines bug bounty policies, where companies reward ethical hackers for identifying system vulnerabilities. The literature review discusses how these pen testers reduce costs by addressing security flaws proactively rather than reactively, which is an effective method to reduce costs in cybersecurity whilst increasing security. Findings highlight both economic and social benefits, financially, bug…
Journal entry 12
The sample data breach notification letter highlights the economic and social implications of a lack of cybersecurity. From an economic perspective, cost-benefit analysis plays a big role, instead of investing in a good security system the company weighs the cost of enhanced security against the risk of potential breaches. The breach also introduces negative externalities,…
Journal entry 11
The video on the cybersecurity analyst role emphasizes social themes relevant to the field, including the importance of understanding social behaviors and human interactions online. Cybersecurity analysts not only monitor for technical vulnerabilities but also analyze social engineering tactics that exploit human psychology. This involves anticipating how attackers might manipulate users to gain access or…
Journal entry 10
This article covers the concept of social cybersecurity, which combines traditional cybersecurity practices with an understanding of social sciences to address online misinformation and propaganda. Social cybersecurity focuses on how adversaries exploit social media and online platforms to influence public opinion, posing challenges to national security. Social cybersecurity is key to understanding how people behave…
Journal entry 9
The Social Media Disorder Scale is a tool designed to assess symptoms associated with problematic social media use. This scale includes items that capture various behaviors. Higher scores on the scale typically indicate a higher likelihood of problematic behavior. The scale’s items represent facets of behavioral addiction, such as preoccupation with social media, neglect of…