Introduction Cybersecurity policy analysts are pivotal in shaping effective strategies to safeguard digital infrastructures, yet their impact extends beyond technology. In today’s interconnected world, where the intersection of technology, society, and governance becomes increasingly intricate, a comprehensive understanding of human behavior, societal dynamics, and policy implications has become imperative. Social science research forms the cornerstone…
Category: CYSE 201S
Journal #15 Digital Forensics Investigator Davin Teo
Davin Teo’s talk was fascinating as there was no established training or formal program for digital forensics when he got his big start. I found his story of how he succeeded as a digital forensics investigator to be unique and lucky to get into the ground floor of digital forensics. His first real opportunity was…
Journal #13 Bug Bounty and Vulnerability Disclosure Policy
Bug bounty programs and vulnerability disclosure policies represent crucial aspects of cybersecurity that promote proactive identification and resolution of security flaws. These initiatives signify a shift towards a more collaborative and transparent approach to addressing systems and software vulnerabilities. Bug bounty programs incentivize ethical hackers to responsibly report vulnerabilities, fostering a community-driven effort to enhance…
Journal #12 Data Breach Notification in relation to Economics theories and Social Science theories
A data breach notification letter, which informs individuals or organizations about a security incident involving their data, can be analyzed through various economic and social science theories: Classical economics theory focuses on market efficiency, rational decision-making, and the role of self-interest in economic interactions. Individuals and organizations may act rationally based on their self-interests and…
Journal #11 Cybersecurity Analyst
The role of a cybersecurity analyst intertwines with various social themes, reflecting a complex interplay between technology and human behavior: These themes highlight how the responsibilities of a cybersecurity analyst resonate with broader societal values, emphasizing security, collaboration, and ethical considerations in the digital landscape.
Journal #10 Social Cybersecurity War
The emergence of social cybersecurity as a pivotal aspect of national security emphasizes the evolving nature of warfare in the digital age. The article rightly points out that information warfare is no longer a mere component but has become an end unto itself, with the ability to shape narratives, disrupt societies, and even influence the…
Journal #9 Social Media and Cybersecurity
I notice that I want to use social media most days. I don’t feel dissatisfied that I cannot use social media platforms. I have never felt bad because I cannot use social media. I usually feel better about myself when I stay away from it. I can force myself to avoid social media if I…
Journal #8 Hacking Movies
Hollywood’s version of cybersecurity often dresses up cybersecurity and tries to glamorize it to show its audience that it is flashy and fast-paced—Hollywood movie production studios like creating exciting words and speed actions that typically take days to minutes. The media often frames cybersecurity incidents, presenting them in a light that can influence public perception….
Journal #7 Cybersecurity Meme
Cybersecurity memes often touch on the human element of security, highlighting the importance of human behavior, decision-making, and understanding in ensuring a secure system. Human Systems Integration (HSI) in cybersecurity refers to considering human factors in designing, developing, and implementing secure systems. Memes often emphasize the need for awareness and education about cybersecurity threats. This…
Journal #6: How to tell if a website is fake
To confirm whether or not a website is fake, pay close attention to the name of the website in the URL. Fake websites often use misspelled variations of well-known domains or domains resembling popular ones. Look for HTTPS in the URL. A secure website should have “https://” at the beginning of the URL and a…