A Career in Cybersecurity

A Career in Cybersecurity What is a System Administrator? Cybersecurity has a wide variety of careers that can cover several types of areas of social science topics that were covered in this class. System Administrators in particular, require skills that implement several concepts we have learned. To fully understand how a System Administrator, or Sysadmin…

Journal Entry #15: Digital Forensics TED Talk

In this TED Talk by David Teo, he explains that he got into digital forensics not by simply looking for it, but it was a situation where he happened to be in the right place in the right time. Of course the fact that he had an interest in the position played a role, but…

Journal Entry #14 – 5 out of 11 Illegal things done online

In the blog for this assignment, there are 11 things that the average person does online that unbeknownst to the individual, is illegal. Each of against the law in their own way, however, I believe that 5 of these items are more severe than the rest. These offenses will be listed from most severe to…

Journal Entry #10: Social Cybersecurity Article Review

In this article, social cybersecurity is described as a tool used by several entities to gain a tactical advantage in technological warfare. It’s also described in a way that can be determined as a weapon if used by parties with malicious intent. Throughout the article, the impact that social cybersecurity has had on the world,…

Journal Entry #11: Cybersecurity Analyst Video

In her description of the cybersecurity analyst job, she mentions that they are the first line of defense that responds to certain instances. However, since some of those jobs would be for a more advanced individual, you would probably start off as a helpdesk technician of sorts until you gain experience. She also mentions that…

Journal Entry #9 – Social Media Disorder Scale

Before taking a look at this scale, I thought to myself that I wouldn’t have a stake in this matter because while I use social media, I don’t use it frequently. I scored relatively low on the scale only answering “yes” to one question “Have I ever had a serious conflict with someone I’m in…

Journal Entry #8 – Hacker Video Review

In todays world, media outlets like Hollywood, Netflix, Hulu, or other streaming services that create shows that involve cybersecurity influences the publics understanding in a way that can be described as informative, but not harmless. In most, if not all types of media regarding cybersecurity, it’s often shown that the hacker is often a very…

Journal Entry #7 – HSI Memes

2. This illustrates the that the HSI was meant for HUMAN interactions rather than animals. 3. This meme illustrates that when integrating the HSI in an organization, it’s important for everyone to be on the same page and used the same system in order for security systems to work seamlessly. 4. This demonstrates the importance…

Journal Entry #6 Fake Websites

When determining what makes a website fake, there are a few key identifiers that you should be aware of. Under normal circumstances, you wouldn’t think to look for anything out of the ordinary when accessing a site because most organizations provide a well designed website that entices you to explore their product or service. However,…