According to the speaker, there is no direct path or courses you can take to be in a digital forensics field. In the speaker’s own words “you either feel into it or got put into it”. Having knowledge in social sciences, such as psychology, sociology, or criminology, can provide valuable insights into understanding the human…
Category: CYSE 201S
Journal #14
Andriy Slynchuk discusses eleven potential illegal activities that unsuspecting internet users may unintentionally engage in. The five most critical offenses among these are unauthorized access to computer systems, copyright infringement, identity theft, distribution of child pornography, and cyberstalking. Unauthorized access to computer systems, often referred to as hacking, poses a significant threat to the privacy…
Journal #13
The economic theories of cost-benefit analysis and principal-agent problem explore the balance of costs and benefits in investing in cybersecurity measures and the potential misalignment of interests between companies and their customers. On the other hand, social science theories such as social trust and risk perception highlight the importance of trust in customer-company relationships and…
Journal #12
Examining the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” in the Journal of Cybersecurity reveals a thorough analysis of the economic dimensions of bug bounty programs and their relevance to cybersecurity. The literature review underscores the increasing significance of bug bounty programs as a means to detect…
Journal #11
After reading the social cybersecurity article featured in the Military Review by the Army University Press, I discovered a revealing analysis of the intricate connection between human behavior and cybersecurity. The article stresses the significance of recognizing and addressing the social facets within the field, positing that a successful cybersecurity strategy must integrate knowledge of…
Journal #10
In the cybersecurity analyst job description, numerous social aspects underscore the value of human connections and teamwork in the profession. To safeguard information systems and networks from potential risks, cybersecurity analysts must effectively communicate with a variety of teams to devise and execute security strategies. This demands robust interpersonal abilities to cultivate trust and collaboration…
Journal #9
After completing the Social Media Disorder scale, my score that I get was 2 out of 9. I think the items/ questions were reasonable. Numerous factors may contribute to the different patterns observed across the world in terms of the Social Media Disorder (SMD) scale, such as cultural, demographic, technological, social, psychological, and educational elements,…
Journal #8
Upon watching “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” on YouTube, it is evident that the media plays a considerable role in shaping our comprehension of cybersecurity. The depiction of hacking and cybersecurity events in movies and television shows can affect public perception in multiple ways. On a…
Journal #2
The principles of science are highly applicable to cybersecurity since it concerns the safeguarding of information and information systems from possible threats and vulnerabilities. Cybersecurity experts apply principles like empirical observation and experimentation to gain an understanding of how systems can be compromised and test the effectiveness of security measures using tools such as network…
Journal #7
“When you spend months designing the perfect system, only to realize you forgot to factor in human error.”