Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career

Link to Video: https://www.youtube.com/watch?v=Pf-JnQfAEew The career of a digital forensics investigator ties deeply to the social sciences, particularly in areas like sociology, psychology, and criminology. By analyzing electronic evidence, investigators navigate human behaviors, decisions, and networks. This understanding is critical in discerning motives and contexts behind criminal cyber offenses, such as fraud, data breaches, or…

Andriy, Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Link to Video: https://clario.co/blog/illegal-things-you-do-online/ The five most serious violations individuals commonly engage in online include: These offenses are serious because they not only infringe on legal rights but also impact industries, expose individuals to security risks, and set harmful precedents for digital ethics. Fostering awareness about these activities is crucial for a more secure and…

As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Describe social themes that arise in the presentation.

Link to Video: https://www.youtube.com/watch?v=iYtmuHbhmS0 The role of a cybersecurity analyst, as described in the video, connects deeply to socialbehaviors in various ways. Analysts often collaborate across departments, requiring strongcommunication and interpersonal skills to work effectively with teams and convey complexsecurity information to non-technical stakeholders. Trust is another key social theme, as analystsmust rely on others’…

Read this and write response to the article on social cybersecurity.

Link to Article: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The military review article on social cybersecurity discusses the evolving risks posed by social media manipulation, where adversaries use misinformation to influence public opinion and destabilize social trust. This new aspect of cybersecurity requires strategies that focus on both technology and human behavior, as traditional technical defenses aren’t sufficient for countering…

The Role of Social Science in a Cybersecurity Analyst’s Career

Introduction Cybersecurity Analysts play a vital role in safeguarding organizations’ digital assets from threats such as data breaches, ransomware, and phishing attacks. While their work primarily involves technical skills, understanding human behavior and societal dynamics is equally crucial. Cybersecurity Analysts require and depend on social science research and principles. Social science provides Cybersecurity Analysts with…

Complete the Social Media Disorder scale.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

Link to Video: https://www.youtube.com/watch?v=Zbqo7MGVElw SMD score: 2  I believe the items on the scale are generally relevant to the more recent generations (gen z.) in the sense that majority of people from the generations that are growing with technology have come to find themselves deeply reliant on them. People who are reliant on new technology and…

Article Review #2

Improving Vulnerability Remediation through Better Exploit Prediction Introduction The article “Improving vulnerability remediation through better exploit prediction” by Jay Jacobs, Sasha Romanosky, Idris Adjerid, and Wade Baker examines the pressing issue of vulnerability management in cybersecurity. Published in the Journal of Cybersecurity, the study addresses how predictive models can assist organizations in prioritizing remediation efforts…

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.

The media plays a vital role in shaping our understanding of cybersecurity, often influencing how seriously we take digital threats. By highlighting significant incidents like large-scale data breaches and ransomware attacks, the media raises public awareness about the dangers of the cyber world. However, this focus on extreme cases can also skew our perception, making…

Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s)

Explain how your memes relate to Human-centered cybersecurity. Caption: The individual’s smile in a relaxed coffee shop setting suggests he’s enjoying a moment of productivity or leisure while working. He likely feels comfortable and secure. Relation to Human-Centered Cybersecurity Photo 1: The relaxed atmosphere of a coffee shop can symbolize the need for a balanced…