Journal Entry 15: Davin Teo is a digital forensics worker. Davin Teo did not choose this field, he was put into it. He saw an IT job opportunity and took it because he liked computers a little bit. Then he got an email about a digital forensics team being formed and he joined them where…
Author: mamic003
Illegal Things People Do Online
Journal Entry 14: The fifth most serious thing people do online I think is faking your identity online. While this can be serious, many people do it and can cause serious harm although the following things are worse in my opinion. The fourth thing is bullying and trolling which can cause serious psychological damage to…
Economics and Cybersecurity
Journal Entry 12: Economics and Cybersecurity are closely tied mainly because governments are responsible for the well-being of most citizens that is their health and safety. Economics is directly related to health as government gives access to healthcare and food to many who are in need and cybersecurity protects the safety of a country. In…
Cybersecurity Analyst Title
Journal Entry 11: A cybersecurity analyst is the first line of defense in a company’s network. With that being said cybersecurity analyst is a broad title, with different roles and specific job titles for each different job listing. Several themes within these jobs are consistent with each one and are essential to getting a job…
Social Cybersecurity Article Summarization
Journal Entry 10: Social cybersecurity more well known as social engineering, is becoming more prevalent in the stage of war in the world. Information is king in today’s society, not only including war. The information helps strengthen narratives, allows entities to come up with educated plans, and can be detrimental to the other side if…
Social Media Disorder Scale
Journal Entry 9: I took the social media disorder scale and scored a 2/9 which means I am not a disordered social media user although, I have some things I can work on. I think the items on the scale are completely valid and can see why 5 or more of those diagnoses you as…
Movies vs Reality
Journal Entry 8: Media influences the public’s ideas of hacking very strongly because for many it is the only instance of hacking that they ever see. This can lead to misconceptions but also educate if done correctly. Most of the time the main issue with media portraying hacking is that it all happens too quickly…
Fake vs Real Websites
Journal Entry 6: This journal entry will compare three fake websites to three real ones and explain why they are fake compared to the real ones. This first example is a simple Google search of Amazon. It is clear to see that there are two different links to choose from, one being https://www.amazon.com and the…
7 Motives for Cybercriminals Ranked
Journal Entry 5: We talked about several motives for cybercriminals in week 5 and they will be ranked from least to greatest motives. For number 7 I chose boredom because it doesn’t necessarily say that the act of committing the crime is entertaining to them, they were simply bored and wanted something worth doing. At…
Maslow’s Hierarchy of Needs
Journal Entry 4: Maslow’s hierarchy of needs says that all of our needs are on a hierarchy from basic to physiological to self-fulfillment. An example from my life that satisfies the first tier is ordering food online for delivery. A second-tier example would be me paying my annual subscription to McAfee which scans my device…