CYSE201S Journal Entry (15) Digital Forensics wrt the Social Sciences

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watchthis video and think about how the career of digital forensicsinvestigators relates to the social sciences. Write a journal entrydescribing what you think about the speaker’s pathway to his career. After watching the video linked above I felt that Davin Teo gave an excellent speech on…

CYSE201S Journal Entry (14) Speaking of Mistake of Law

After reading the article and looking over each of the violations I feel that the top five most serious violations are; faking your identity, using other people’s internet networks, bullying and trolling, illegal searches on the internet, and sharing passwords, addresses, or photos of others. The reason why I feel these are the top five…

CYSE201S Journal Entry (13) Bug Bounty Policies

Journal entry — Bug Bounty PoliciesA later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try…

CYSE201S Journal Entry (12) Case Study Theory Comparison

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciencestheories relate to the letter. After reading the article above I find that the theories that relate best to the given event are the classical economic theory, rational choice economic theory, social exchange theory,…

CYSE201S Journal Entry (11) Cybersecurity Analyst and Social Behaviors

Journal EntryWatch this video. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0, think about howthe description of the cybersecurity analyst job relates to socialbehaviors. Write a paragraph describing social themes that arise in thepresentation. Cybersecurity analysts’ jobs can vary in the job title as well as particular tasks depending on where the job is located. However, each degree…

CYSE201S Journal Entry (10) Social Cybersecurity Article Review

Read this and write a journal entry summarizing your response to the article on social cybersecurity. Article: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ I found the above article to be very interesting and explained a valuable viewpoint. When discussing traditional cybersecurity, the focus is on the technology that is being used to hack other forms of technology. Whereas the main…

CYSE201S Journal Entry (9) Social Media and Cybersecurity

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? Overlooking the items found in the Social Media Disorder scale I can proudly say that I have not related to any of the following within…

CYSE201S Journal Entry (8) Media Influence on Cybersecurity

• Watch this video and pay attention to the way that movies distorthackers. Hacker Rates 12 Hacking Scenes In Movies And TV | HowReal Is It? – YouTube• After watching the video, write a journal entry about how you thinkthe media influences our understanding of cybersecurity In modern-day media, I feel cybersecurity is adjacently talked…