In the video, the speaker starts off as an accountant who did a little network stuff on the side at his accountant job. As he progressed in experience level and, given his dual abilities making him twice as marketable, he ended up at a big accounting firm. While there, he had an offer come up…
Category: CYSE201S
Should You Be Arrested?
Of the eleven activities mentioned in Andriy Slynchuk’s article 11 Illegal Things You Unknowingly Do on the Internet, there are five things that stick out to me more egregious than the others. The first one is wrong for an adult no matter the occasion, and it surprises me that it is even on a list…
Life as an Exploitation Analyst
Introduction Life inside of any career field imaginable relies on social science to be able to do the job to the maximum effect. A physical therapist uses research in natural science to identify different exercises to help a person recover from a traumatic injury or ailment, but uses research in social science to identify what…
Bug Bounties and Freelance Hackers
The use of freelance security researchers in bug bounty markets is a concept which enables companies, both large and small, to benefit from professional resources without employing full-time security staff. The article linked below discusses the background of this process and the findings of a research team that took five and a golf years of…
Economic and Social Theories Collide
The sample breach notification linked below is an example of how economic and social science theories can collide in the world of cybersecurity. For example: in the world of economics, the Laissez-faire economic theory says that, “the government should not intervene in the economy except to protect individual’s inalienable rights.” The existence of this letter,…
Social Behaviors in Cybersecurity
In the video, “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” the author discusses the basic tasks an entry-level Cybersecurity Analyst can be expected to do. Throughout the video the social behaviors I felt were best represented were technical and social skill, civic duty, continued learning, and communication. Technical skill is implied…
On Social Cybersecurity
Learning more about social cybersecurity was my original goal when pursuing a cybersecurity degree. Utilizing the things we know about society merely through observation, and weaponizing it to achieve specific goals. Although the authors of “Social Cybersecurity An Emerging National Security Requirement”, Beskow and Carley, primarily focus on Russia’s use of the information domain, the…
Article Review #2
Deepfakes in Society The study Victimization by Deepfake in the Metaverse: Building a Practical Management Framework (Stavola, J. & Choi, K.,2023) conducted interviews with 8 experts chosen through the snowball sampling method and open-source research to “design a framework and provide solutions to mitigate deepfake-related victimization in the metaverse.“ What this means is the researchers…
Social Media Disorder Scale
On the Social Media Disorder Scale I scored a solid 2/9. I could easily have found myself in the red (5+ of 9 criteria met) in my late teens and early 20’s, in the Myspace Era and the Time of Early FaceBook. What caught my attention about the questions in the scale was how they…
Media Influence in Cybersecurity
Media skews the public’s view of everything. Cybersecurity is not an exception. Whether it’s the news, movies, or any other media it can be hard to get a clear picture of the cyber world. The news is the biggest offender here. News outlets often use inflammatory language and exaggeration to draw in viewers and increase…