Dark Side of AI – How Hackers use AI & Deepfakes | Mark T. Hofmann . Watch this video and describe what ethical questions did the presentation raise for you? How do you think society should address these ethical concerns? The presentation raised several meaningful ethical questions about the growing power of artificial intelligence and…
Category: Journal Entries
Journal Entry #14
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Among the eleven risky online behaviors Andriy Slynchuk talks about, the five that really stand out as the most…
Journal Entry #13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try exploring the cyber infrastructure using…
Journal Entry #12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological social sciences theories relate to the letter. After reading the “Sample Data Breach Notification” letter from GlassWasherParts.com, I can see clear connections between economics and psychology in how the company handled the…
Journal Entry #11
Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. The description of the cybersecurity analyst job highlights several social themes related to human behavior…
Journal Entry #10
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.sciencedirect.com/science/article/pii/S2451958825000831Links to an external site. The article “A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects” explores how cybersecurity must now extend beyond technical defenses to include the human and social dimensions of online…
Journal Entry #9
Watch this Video: Social media and cybersecurityLinks to an external site. Complete the Social Media Disorder scale Download Social Media Disorder scale. or please find the attachment here: Social Media Disorder Scale-1.pdfDownload Social Media Disorder Scale-1.pdf. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across…
Journal Entry #8
Watch this video and pay attention to the way that movies distort hackers. Scientists Rate 65 Scenes from Movies and TV | How Real Is It? | Insider – YouTube Links to an external site. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. After watching…
Journal Entry #7
Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). What’s going on in their mind:They’re initially excited or curious about what the email says, maybe thinking it’s something urgent or important but then they realize it’s fake just…
Journal Entry #6
Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features and similarities that identify each fake website as fraudulent. I compared three fraudulent websites with their legitimate counterparts (PayPal, Chase Bank, and…