According to the speaker, there is no direct path or courses you can take to be in a digital forensics field. In the speaker’s own words “you either feel into it or got put into it”. Having knowledge in social sciences, such as psychology, sociology, or criminology, can provide valuable insights into understanding the human…
Journal #14
Andriy Slynchuk discusses eleven potential illegal activities that unsuspecting internet users may unintentionally engage in. The five most critical offenses among these are unauthorized access to computer systems, copyright infringement, identity theft, distribution of child pornography, and cyberstalking. Unauthorized access to computer systems, often referred to as hacking, poses a significant threat to the privacy…
Journal #13
The economic theories of cost-benefit analysis and principal-agent problem explore the balance of costs and benefits in investing in cybersecurity measures and the potential misalignment of interests between companies and their customers. On the other hand, social science theories such as social trust and risk perception highlight the importance of trust in customer-company relationships and…
Journal #12
Examining the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” in the Journal of Cybersecurity reveals a thorough analysis of the economic dimensions of bug bounty programs and their relevance to cybersecurity. The literature review underscores the increasing significance of bug bounty programs as a means to detect…
Journal #11
After reading the social cybersecurity article featured in the Military Review by the Army University Press, I discovered a revealing analysis of the intricate connection between human behavior and cybersecurity. The article stresses the significance of recognizing and addressing the social facets within the field, positing that a successful cybersecurity strategy must integrate knowledge of…
Journal #10
In the cybersecurity analyst job description, numerous social aspects underscore the value of human connections and teamwork in the profession. To safeguard information systems and networks from potential risks, cybersecurity analysts must effectively communicate with a variety of teams to devise and execute security strategies. This demands robust interpersonal abilities to cultivate trust and collaboration…
Journal #9
After completing the Social Media Disorder scale, my score that I get was 2 out of 9. I think the items/ questions were reasonable. Numerous factors may contribute to the different patterns observed across the world in terms of the Social Media Disorder (SMD) scale, such as cultural, demographic, technological, social, psychological, and educational elements,…
Journal #8
Upon watching “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” on YouTube, it is evident that the media plays a considerable role in shaping our comprehension of cybersecurity. The depiction of hacking and cybersecurity events in movies and television shows can affect public perception in multiple ways. On a…
Why are you interested in cybersecurity technology?
As our dependence on technology and the internet continues to grow, I find myself increasingly drawn to the field of cybersecurity due to the strong need for robust measures to protect sensitive data and systems. This ever-changing and dynamic field presents numerous opportunities for professionals like myself. The constant evolution of cybersecurity technology, which addresses…
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
Acknowledging the limitations of predictive knowledge in the rapidly evolving landscape of cyber threats and technology is crucial when developing cyber-policy and infrastructure. As such, it’s essential to adopt an approach that is flexible, adaptive, and multi-layered to effectively address these challenges. One of the key principles to consider is the emphasis on adaptability. Cyber…