I think the way that Davin started his career in the cybersecurity space is very unique. He started in the early 2000’s. In that time he stated that he didn’t have traditional courses or schooling to propel him into digital forensics. It was an important time in the tech field because this was the start…
Category: 201S Journal
Things Internet Users Do That May Be Illegal
From the list of 11 illegal things you unknowingly do online I think the most serious violation is bullying and trolling. I think that this has the most lasting negative effects on both perpetrator and victim. Bullying at a young age can develop negative and maybe fearful characteristics in a person and on the flip…
Bug Bounty Program
According to Kiran and Ming (2021), “We ran a study of bug bounties, programs where gig economy security researchers are compensated for pinpointing and explaining vulnerabilities in company code bases”. Bug bounty programs are useful for finding out vulnerability in your system. How I like to explain bug bounty programs are like pre season games….
Data Breach & Theories
After reading the data breach notification I noticed some economic and social science theories at play here. The first economic theory that I have seen present is Rational Choice Theory. Rational Choice Theory is when individuals or businesses make choices in their best interest. In the letter they stated that the third party company that…
How Cyber Security Analyst Relate To Social Behaviors
There are a couple main social themes that arise in the presentation. First because it is an entry level job, candidates that apply or receive these jobs have limited technical experience. So at the beginning of the video she talks about user training, and basically boeing an IT help desk. Helping in areas like phishing…
Social Cybersecurity
I think the days of thinking that cybersecurity primarily refers to the ability to protect machine data are long gone in the past. What Beskow and Carley bring up is social cybersecurity which is pretty much humans using technology to hack other humans. How society can be changed and affected by the use of social…
Social Media Disorder Scale
I have actually never heard of the Social Media Disorder scale until today and it is an interesting little survey. Personally I use social media but compared to my friends and peers, I upload and stay on social media a lot less than my group. Most of the questions that I answered did not relate…
Article Review 2
Larry Le Department of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity & Social Science Dr. Leigh Armistead October 1, 2023 Cyber Bullying Behaviors, Anonymity, and General Strain Theory: An Article Review This study by Gang Lee and Matheson Sanchez aims to explore the nature of cyberbullying in college students, to identify which types of strain…
How Media Influences Our Understanding of Cybersecurity
Before watching the video I thought that they would negatively criticize how Hollywood would portray hacking but I was surprisingly wrong. The security analyst was very generous with her movie scores. The examples that were used in the clip were scenes from more recent movies and television shows. Nowadays I think because cyber security incidents…
Memes Vs Human Factors
Keeping employees aware of watering holes will help mitigate risk. Malware is placed on these websites that hacks know potential victims will access. This relates because no matter how secure the system is, all they need to do is acquire a users information This relates to the human factor because of how people may think…