Category: CYSE 201s
Journal Entry 15
Today, I had the opportunity to attend a seminar where a seasoned digital forensics investigator shared insights into his career journey. As someone deeply interested in the intersection of technology and society, I found his pathway particularly intriguing, especially in relation to the social sciences. The speaker began by recounting his background in computer science,…
Journal Entry 14
In my opinion, I believe that the first serious violation of Slynchuk is collection information about children. It should be explainable but as soon as I saw it as an option, I knew it was one of the five most serious violations. It is sad to say that it is a practice of certain individuals…
Journal Entry 13
Bug bounty policies are an intriguing concept where companies reward ethical hackers for identifying vulnerabilities in their systems. This approach taps into the wider security expertise of the hacker community, aligning with a social science perspective on collaboration. Traditionally, companies relied on internal teams for security, potentially missing out on broader knowledge. Bug bounties offer…
Journal Entry 12
The “Sample Data Breach Notification” letter can be analyzed through the lens of different economic and social science theories. 1. Economic Theory – Information Asymmetry: This theory suggests that one party often has more or better information than the other, creating an imbalance of power. In the context of the letter, the company had more…
Journal Entry 10
Today, I delved into an intriguing article on social cybersecurity from the Military Review. The article emphasizes the importance of understanding the social aspects of cybersecurity, a perspective often overlooked in favor of technical solutions. It argues that cybersecurity is not just a technical issue but also a human one, as human behavior plays a…
Journal Entry 11
The Cybersecurity analysts continuously monitor an organization’s computer systems and networks for any suspicious activity or potential security breaches. They use specialized software and tools to detect anomalies in network traffic, system logs and user behavior. Investigating the Security Incidents Implementing the Security Measures Develop Security Policies and the Procedures Stay Up-to-Date with Security Trends:…
Journal Entry 9
I completed the scale and I received a score of 3.0. I believe that most of the questions that are asked within the survey is mainly demonstrated for individuals who have a greater connection to social media than I might have. I am normally not that involved with social media therefore, I believe that was…