Sample Data Breach Notification

The simple data breach notification letter provides serves as a critical document for informing affected individuals about a security incident. This type of communication can be analyzed through different economic and social science lenses to better understand its implications. From a economic perspective, the theory of information asymmetry applies, as data breaches create an imbalance…

Digital Forensics(Davin Tao’s TEDx talk)

Before watching Davin Tao’s TEDx talk, I expected to hear about the technical side of Digital Forensics. Computers, data recovery, or tools were replaced by finding information on hard drives, understanding why the crime happens, the cover-ups, and building stories based on fragmented digital clues. Social science is about studying people and how they behave,…

Analyst Job Highlights

The cybersecurity analyst job highlights several social themes related to human behavior and security awareness. One theme is the role of human error and social engineering in cyber threats. The talks about the many breaches of security caused by manipulation tactics. Phishing scams that exploit trust and social norms to gain access to sensitive information….

Clario’s article

After reading Clario’s article, most people I know collect felonies like Pokémon. Recording your friend who passed out after a night of hard drinking is a misdemeanor. Recording someone’s feet in public should be a felony. The five most important violations are commonly used without knowledge of consequences. Watching movies and old shows through Torrent…

Bug Bounty

Bug Bounty is an innovative policy used to show cybersecurity vulnerabilities. These policies formalize how companies engage with ethical hackers by offering rewards in exchange for discovering and reporting flaws. As a cost-benefit analysis, this policy allows companies to control risk by outsourcing vulnerability testing to a boarder community, while lower cost of the action…

Career Paper

The Role of Malware Analysts in Cybersecurity and SocietyIntroductionMalware analysis is a vital field in cybersecurity that focuses on studying malicious software to understand how it operates, spreads, and can be neutralized. Professionals in this area play a key role in protecting organizations, governments, and individuals from cyberattacks. However, their work extends far beyond the…

Principles of Science

Relativism-All things are related or connected. A change in one systems will lead to a change in another system. Objectivity-Topics and studies should not have a opinion of a point of view, but to advance knowledge. Opinions will reshape the narrative of a study or research to fit an objective. Parsimony-Keep things simple. Empiricism-Studies are…

Privacy is a fundamental right

Publicly available information on data breached like what is found on the platform PrivacyRights.org. helps researchers how and why data breaches happens. Examining different cases can help researchers find common patterns like which organization is most affected and what type of data was stolen or corrupted. This informations help them figure out the main causes…