-
Journal Entry #1
LUKE DUNK5/22/2024PROF. DUVALL Starting my journey at Atlantic Bay Mortgage Group (ABMG) as their new Information Technology intern, I transitioned from working retail into an office environment. Within my first 50 hours at ABMG, I felt out of place, as I was not used to working at a computer screen for a long duration of……
-
Journal Entry #15
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Digital forensics investigators use social sciences to understand the mind of a cybercriminal to help prosecutors store, analyze, and report electronic evidence……
-
Journal Entry #14
Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Top Five Most Serious Violations
-
Journal Entry #13
Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Economic Theories Keynesian Economic Theory – After an organization suffers from a data breach, it’s critical that the organization notifies all their participants, including their customers, about how their……
-
Journal Entry #12
Read this article and write a summary reaction to the use of the policies in your journal. Bug bounty programs offer security researchers the ability to discover and report any cybersecurity vulnerability in an organization’s cyber infrastructure for compensation. Through crowdsourcing, organizations can get an insight on the mind of an attacker and understand how……
-
Journal Entry #11
Read this and write a journal entry summarizing your response to the article on social cybersecurity. The provided article was highly informative and sheds light on a subdomain in cybersecurity known as social cybersecurity. The concept of social cybersecurity focuses on the scientific principles that achieves two main objectives: Analyze changes in human behavior impacted……
-
Journal Entry #10
Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. In the video, cybersecurity analysts are classified under many different career tiles and names, but typically have the same job responsibilities. As……
-
Journal Entry #9
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you … • regularly found that you can’t think of anything else but the moment that you will……
-
Journal Entry #8
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity Individuals who do not fully understand the concept of cybersecurity are mostly influenced by the media they consume. Instead, different forms of media have different goals. Some goals focus on solely entertaining the viewers and do……
-
Journal Entry #7
Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s) The following meme depicts a happy individual smiling on his computer, with text above saying “When you successfully pass the human factor training after the 183049th time.” The meme……
-
Journal Entry #6
Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? Many cyberattacks focus on deceiving human judgment to trick victims into providing sensitive information in a fake application. A lot of times, this is in the form of a fake website. The top……
-
Journal Entry #5
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it After reviewing the linked article on cybercrime motives, I have compromised……
-
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Abraham Maslow’s hierarchy of needs states that all humans are basic, psychological, and self-fulfilling needs based on a hierarchy. Maslow’s hierarchy emphasizes the point that……
-
Journal Entry #3
It’s important for researchers to analyze data breaches for multiple reasons through a technical and social lens. Researchers can understand why the data breach occurred to educate others about the issue. This helps mitigate the chances of other organizations becoming victims of this attack vector. In addition, data breaches also provide information about the potential……
-
Journal Entry #2
Science is respected and uses knowledgeable facts to help create, maintain, and improve useful human endeavors inside many industries. Cybersecurity is an applied science that uses a social science framework, that directly relates to natural scientific processes, to discuss human behaviors involving cybersecurity. Some of these social science principles are listed: While some of these……