Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. In the following video, Davin described his pathway to becoming an expert in digital forensics. He stated when he first started out,…
Category: Journal Entries
Journal Entry 14 – Eleven Illegal Things You Unknowingly Do On The Internet
Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. After reviewing the eleven things Internet users do that…
Journal Entry 12 – Sample Data Breach Notification
“Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.“ Economic Theories The first economic theory that relates to the breach letter is the game theory. The game theory is used to predict behaviors, model complex…
Journal Entry 13 – Summarize the following article on Bug Bounty policies
“A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try exploring the cyber infrastructure using…
Journal Entry 10 – Summarize this article about social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ Read this article and then write a paragraph summarizing your view on it. This article went in depth about what social cybersecurity plans there are for the future and how its differences with cybersecurity could possibly be an issue and/or a war weapon. In order to defend security, leaders must first understand the discipline…
Journal Entry 11 – How does working as a cybersecurity analyst relate to social behaviors?
Having a cybersecurity analyst job means having a wide variety of responsibilities and duties depending on the organization you work for. Therefore, there are many social themes within the field. In the video, one thing she mentioned was networking and working with your organization, since cybersecurity analyst must work closely with other departments within their…
Journal Entry 9 – Watch this video and complete the Social Media Disorder Scale.
Next, complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? After watching the video above, I took the social media disorder scale test. I said yes to one out of nine of the…
Journal Entry 8 – How does the media influence our understanding on cybersecurity?
Watch this video and pay attention to the way that movies distort hackers. Here are my thoughts after watching the following video. The media can strongly influence our understanding on cybersecurity in many ways. Most movies, TV shows, and video games depict hackers as someone who is extremely fast at what they do, as well…
Journal Entry Week 7 – Explain how the following three memes relate to human-centered cybersecurity
Phishing is one way cybercriminals trick individuals into giving them sensitive information, downloading viruses, and/or clicking malicious links. Human-centered cybersecurity can address phishing emails by understanding human behavior/decision making and creating the proper security measures to avoid it. Therefore, the following meme above shows a man having a conversation with a few other people. He…
Journal Entry Week 6 – Real Vs. Fake Websites
Note: Please do not click on the fake websites Fake Websites: https://teechip.com/ https://www.vivobarefotsale.com/ https://www.belenkasale.com/ Real Websites: https://www.target.com https://www.amazon.com https://www.usps.com A couple ways you can authenticate a website are: Look for errors in the URL & on the website – Many fake websites contain grammatical and punctuation errors. Confirm the contact page – You can confirm…