file:///Users/kevinperson79icloud.com/Downloads/annotated-Meme%2520journal.docx.pdf
Author: kpers009
Hacker Movies. Are they true?
After watching this video, I am convinced that Hollywood hackers have the easiest jobs in the world. In. ovies, all they need to do is dramatically type random gibberish, yell “I’M IN,” and suddenly, the Pentagon’s security system collapses like a house of cards. Meanwhile real hackers spend hours troubleshooting why their Wi-Fi will not…
Social Disorder
1. How did I score? I received a score of 0 “yes” on the Social Media Disorder scale, indicating that I do not exhibit signs of social media addition based in the criteria used in the assessment. 2. What do you think about the items on the scale? The items in the scaled seem to…
Military Review of Social Cybersecurity
The Military Review of Social Cybersecurity highlights the critical role human behavior plays in cybersecurity threats and defenses. It shows how adversaries manipulate social structures and behaviors to exploit vulnerabilities, particularly through misinformation, phishing, and psychological operations. One key takeaway is the use of social engineering tactics by actors with malicious intent. Instead of relying…
Sample Data Breach Notification
The simple data breach notification letter provides serves as a critical document for informing affected individuals about a security incident. This type of communication can be analyzed through different economic and social science lenses to better understand its implications. From a economic perspective, the theory of information asymmetry applies, as data breaches create an imbalance…
Digital Forensics(Davin Tao’s TEDx talk)
Before watching Davin Tao’s TEDx talk, I expected to hear about the technical side of Digital Forensics. Computers, data recovery, or tools were replaced by finding information on hard drives, understanding why the crime happens, the cover-ups, and building stories based on fragmented digital clues. Social science is about studying people and how they behave,…
Analyst Job Highlights
The cybersecurity analyst job highlights several social themes related to human behavior and security awareness. One theme is the role of human error and social engineering in cyber threats. The talks about the many breaches of security caused by manipulation tactics. Phishing scams that exploit trust and social norms to gain access to sensitive information….
Clario’s article
After reading Clario’s article, most people I know collect felonies like Pokémon. Recording your friend who passed out after a night of hard drinking is a misdemeanor. Recording someone’s feet in public should be a felony. The five most important violations are commonly used without knowledge of consequences. Watching movies and old shows through Torrent…
Bug Bounty
Bug Bounty is an innovative policy used to show cybersecurity vulnerabilities. These policies formalize how companies engage with ethical hackers by offering rewards in exchange for discovering and reporting flaws. As a cost-benefit analysis, this policy allows companies to control risk by outsourcing vulnerability testing to a boarder community, while lower cost of the action…
Career Paper
The Role of Malware Analysts in Cybersecurity and SocietyIntroductionMalware analysis is a vital field in cybersecurity that focuses on studying malicious software to understand how it operates, spreads, and can be neutralized. Professionals in this area play a key role in protecting organizations, governments, and individuals from cyberattacks. However, their work extends far beyond the…