Cybersecurity touches all disciplines. An important idea to keep in mind is that in the current technological climate, virtually everyone relies on computers and the internet. There are very few disciplines that have skills that do not translate to cybersecurity. This gentleman is an excellent example of this, as transitioning from an accountant to an…
Cybersecurity Analysts: Understanding People
The career I have chosen, as well as my current interest, is being a cybersecurity analyst. This job is heavily involved in the social aspects of cybersecurity, nearly as much so as the technical aspects. First discussed will be the duties of a cybersecurity analyst, and second will be how these duties relate to concepts…
Internet Laws You May Be Breaking
Regarding what Andriy Slvnchuk identifies as illegal things unknowingly conducted online, I believe the most serious offenses are the following: Sharing passwords/addresses/photos of other, bullying/trolling, recording a VoIP call without consent, faking your identity online, and collecting information about children. The worst of these offenses I believe to be Sharing passwords/addresses/photos of others. The reason…
Bug Bounty Policy
There are numerous policies enforced (or lack thereof) that greatly influence the bug bounty and ethical hacker market in the US. One of the most important is the vulnerability disclosure policy. This is because it affects consumers and organizations alike. Without proper vulnerability disclosure policies in place, bug bounty hunters cannot be sure that when…
Data Breaches and Socioeconomic Theories
Two economic theories that relate to the example breach letter are rational choice theory and laissez-faire economic theory. Rational choice theory states that entities make choices in their best interest. Regarding this data breach notification, it is well within the organization’s best interest to notify its consumers of the breach. If they did not do…
Cybersecurity Analyst Social Aptitudes
One of the first themes that arose was the idea of providing guidance and training for user awareness. The first line of defense in cybersecurity are end users, and as such ensuring that the people utilizing the network are aware of what is at stake and the risks associated with what they have access to…
Social Cybersecurity
I wholeheartedly agree regarding the idea that the world has shifted from physical to information warfare. The internet as a communication medium is substantially more powerful than any other, we have seen, and using it as an attack vector provides significantly more benefits than just outright physically attacking a nation. The fact that a country…
Social Media Abuse Scale and Society
In scoring myself on the Social Media Disorder scale, I was confidently able to answer no to all the questions as presented. Approximately one year ago, I would not have been able to say the same. Since I have been involved in Cybersecurity, I have been increasingly cognizant of my cyber footprint, and have decided…
The Media and Cybersecurity
As the media does with most things, they typically only show what they want you to see. When it comes to cybersecurity, fear and generalization seems to be the narrative of choice for news outlets. In all reality, the actual impact of cybersecurity breaches is significantly more nuanced. For example, when new outlets report of…
Human Systems Integration in Cybersecurity
Human Systems Integration in Cybersecurity