CYSE 201S Journal Entry #15

The speaker describes his professional journey as anything but simple. “There was no clear or established route into digital forensics when I entered the field; you either stumbled into it or were placed there by circumstance,” he explained. That concept strikes me as really insightful since it illustrates how, sometimes, choosing the appropriate career requires…

CYSE 201S Journal Entry #11

Matthew Burd 3/24/2025CYSE 201S Journal Entry #11 Social behaviors are closely tied to the job of a cybersecurity analyst in a number of ways. One benefit of cybersecurity experts’ frequently high salaries is that it can raise their social standing and increase their financial security, which may affect their capacity to obtain better housing, schooling,…

CYSE 201S Journal Entry #7

By depicting a person using a laptop while wearing a face mask, this meme demonstrates a misunderstanding about computer viruses by suggesting that the “virus” infecting the machine is contagious, similar to a human virus. This emphasizes the negative effects of inadequate virus protection training from the standpoint of human-centered cybersecurity. Lack of cybersecurity awareness…

CYSE 201S Career Paper

Matthew Burd CYSE 201S 3/27/25 Cybersecurity Analysts: Implicated Social Sciences Social science concepts like objectivity, relativism, parsimony, determinism, and skepticism, as discussed in this class, are used by cybersecurity analysts to predict cyber threats, create efficient security measures, and reduce risks. These principles assist them in navigating relationships with minorities and guarantee moral security procedures…

CYSE 201S Journal Entry #14

The article lists several online behaviors that, despite being widespread, that can have significant legal repercussions. Using unlicensed streaming or torrent services, exposing someone else’s personal information, cyberbullying, identity fraud, and searching for illegal content online are the five most significant violations. Because these actions infringe intellectual property, privacy, and potentially criminal law, they are…

CYSE200T -Analytical Paper-

Bottom-Line-Up-Front (BLUF) Cybersecurity is a critical concern in modern infrastructure, particularly in industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems. These systems manage essential utilities, including water treatment, power grids, and transportation networks. The CIA Triad—Confidentiality, Integrity, and Availability, is a fundamental framework for securing these systems against cyber threats. This…

CYSE 201S Journal Entry #13

By rewarding ethical hackers for finding weaknesses in a company’s cyber infrastructure, bug bounty programs provide an affordable method of cybersecurity. The literature study emphasizes the programs’ economic justification and their effectiveness in comparison to more conventional security measures. Businesses gain from a proactive approach that enables them to handle security risks before bad actors…

CYSE 201S Journal Entry #12

Two economic theories and two social science theories can be used to assess the “Glasswasherparts” data breach notification letter. Information asymmetry theory applies from an economic standpoint because, although the organization and its platform supplier were more aware of the security threats, customers were not informed of the incident for almost a year. This disparity…

CYSE 201S Journal Entry #10

Matthew Burd 3/24/25 Beskow and Carley, emphasize the increasing importance of social cybersecurity as a crucial component of national security, emphasizing its involvement in both conventional and unconventional warfare. Social cybersecurity examines how cyber-mediated risks affect social structures, political consequences, and human behavior, in contrast to traditional cybersecurity, which defends information systems against assaults. To…

CYSE 200T Write Up – The Human Factor in Cybersecurity

Balancing Training and Cybersecurity Technology: A Risk-Based Approach I place a high value on a risk-based approach to cybersecurity spending because I am a CISO with a tight budget. My approach makes sure that technical and human defenses complement one another, improving the organization’s security posture while keeping costs down. I suggest spending 10% on…