LUKE DUNK5/22/2024PROF. DUVALL Starting my journey at Atlantic Bay Mortgage Group (ABMG) as their new Information Technology intern, I transitioned from working retail into an office environment. Within my first 50 hours at ABMG, I felt out of place, as I was not used to working at a computer screen for a long duration of…
Journal Entry #15
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Digital forensics investigators use social sciences to understand the mind of a cybercriminal to help prosecutors store, analyze, and report electronic evidence…
Journal Entry #14
Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Top Five Most Serious Violations
Journal Entry #13
Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Economic Theories Keynesian Economic Theory – After an organization suffers from a data breach, it’s critical that the organization notifies all their participants, including their customers, about how their…
Journal Entry #12
Read this article and write a summary reaction to the use of the policies in your journal. Bug bounty programs offer security researchers the ability to discover and report any cybersecurity vulnerability in an organization’s cyber infrastructure for compensation. Through crowdsourcing, organizations can get an insight on the mind of an attacker and understand how…
Journal Entry #11
Read this and write a journal entry summarizing your response to the article on social cybersecurity. The provided article was highly informative and sheds light on a subdomain in cybersecurity known as social cybersecurity. The concept of social cybersecurity focuses on the scientific principles that achieves two main objectives: Analyze changes in human behavior impacted…
Journal Entry #10
Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. In the video, cybersecurity analysts are classified under many different career tiles and names, but typically have the same job responsibilities. As…
Journal Entry #9
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you … • regularly found that you can’t think of anything else but the moment that you will…
Journal Entry #8
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity Individuals who do not fully understand the concept of cybersecurity are mostly influenced by the media they consume. Instead, different forms of media have different goals. Some goals focus on solely entertaining the viewers and do…
Journal Entry #7
Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s) The following meme depicts a happy individual smiling on his computer, with text above saying “When you successfully pass the human factor training after the 183049th time.” The meme…