Author: kmcfa007
Journal #15
It is an interesting path Davin Teo took to get to being a Digital Forensic Investigator. When you look at things from social sciences, it makes you wonder about theories like Determinism. When you look at that theory, if he was predetermined based on his affinity to IT to become a criminal, he would have…
Journal #14
Unknowingly doing illegal things online? This might be you, and for some of the 11 items listed by Andriy Slynchuk, you might never consider it. Of those listed, the following five, I consider to be the most egregious to commit, unknowingly or not. First, Sharing Passwords, Address or Photos of Others, two major problems here,…
Article #2 Cost Benefit Analysis and NIST RMF
Every President since President Bush has recognized the risk of cybersecurity breaches in the ever-expanding interconnected digital world of the Internet. President Obama in his Executive Order (EO) 13636 described how important it was to improve critical infrastructure cybersecurity. In this EO there is an established requirement that the “National Institute for Standards and Technology…
Journal #13
I find that bug hunting in the cybersecurity realm is very a very smart and beneficial route to take. Yes, it takes advantage of cost/benefit economic principles which is also criminological theory, and what better way to take all those potential negative criminal actions and redirect them into a positive route. There is empirical evidence…
Journal #12
As far as the Glass Washer Parts Letter goes, any number of economic and sociological theories can apply to this situation depends on other hypothetical details not mentioned. Rational Choice theory is a solid example, the intruder to Glass Washer Parts system could have thought that it was worth more to them to commit the…
Journal #11
There is an undeniable need for Cybersecurity Analyst, which is why it is a field/industry with practically zero percent unemployment. But if the need is so great, then it makes you wonder how if there is any lack of or “need” for attackers? Clearly not, if the need for analyst is so great, what factors…
Journal #10
Hacking humans in warfare is not a new concept. The terminology might be different, the medium and methods may be different but the results end up the same, information gained to gain advantage in war. It was once referred to as spying, or getting insider informants, maybe even defectors, via various means and methods people…
Journal #8
Of those in the Cybersecurity industry, how many of you have an image in your mind of what a Security Operations Center (SOC) looks like? Look like an operations center at NASA or the Situation Room in the White House? Chances are a SOC looks nothing like this, but that image still exists. This is…