Journal Entry 15

In regards to Davin Teo’s TED talk about Digital Forensics and his pathway to his career as a digital forensic investigator. What I think about his pathway is that it claim he started in “accounting” and had seen a job posting for the first digital forensics firm in Australia. With how he started in accounting…

Journal Entry 13

This article provided insight into what “bug bounties” are and how they are used bycompanies to find vulnerabilities in their digital infrastructure and get it fixed after the report bya freelance hacker has been submitted and the hacker rewarded for their findings. Companies usethese bug bounties to have these vulnerabilities found and patched, but it…

Journal Entry 12

With regards to the “SAMPLE DATA BREACH NOTIFICATION” article that wasprovided, and taking a deeper look at what type of economic and social science theories thatcould be drawn from it or could be used in relation to a actual event where a letter like this mightbe sent out. Starting with two economic theories, the first…

Journal Entry 11

            The description of a cybersecurity analyst job relates to social behaviors in how and what type of work is done, with the work that can be most of the time always having fall back to having to work with people and having to help others as well. From dealing with others, to having people…

Journal Entry 10

The article draws attention to different aspect of cybersecurity starting with the information side of it, clarifying what information warfare is now and how it is now the “main” type of warfare that does occur, and that these wars are not declared but have already began. Information is the biggest strength of these for national…

Journal Entry 9

For the Social Media Disorder scale I scored a 1/9 based on what is provided from thenscale and their descriptions. For what they all pertain to I do feel like I have a very good selfdiscipline of being able to not constantly be on social media and need it as a part of my daily…

Journal Entry 8

The way the media influences our understanding of cybersecurity in that it portrays it as justhacking. In that most media that does include anything cyber related it is mostly just abouthacking, and a dramatization of the process of hacking. Most movies and shows that include ahacker shows a person going through the process of hacking…

Journal Entry 7

This meme relates to the Human systems integration framework by the need for proper system security education. This meme primarily focuses on the training of phishing links that may lead to a user’s information being stolen or their system being compromised. One place in particular that heavily focuses on this type of training on a…