People with cybersecurity-related jobs often take unique pathways to get to their jobs jobs. While some may have a degree in that field or certifications, many people don’t start out that way. Davin Teo talks about his route to becoming a digital forensics investigator in his TED talk. He started out as an accountant and…
Journal Entry #14: Illegal Things People Do On the Internet
There are many things you can do on the internet that, at best fall into a gray area of legality and at worst, are completely illegal. One of the worst things, in my opinion, is collecting information about children. There is no reason anyone should be collecting data about minors. That is an absolute invasion…
Journal Entry #13: Bug Bounty Policies
Bug bounty policies are policies made by companies that offer the promise of no retaliation or legal repercussions for people that discover and tell them about bugs in their software. Many companies offer money and other incentives for people, often freelance hackers, to do this for them. This gives them many people to search for…
Journal Entry #12: Economic Theories, Social Science Theories, and Data Breaches
There are different economic theories and social science theories that relate to a data breach notification letter. Rational choice theory is the first theory that comes to mind. This is the theory that an individual or business will make choices that are in their best interest. This could apply to both the person committing the…
Journal Entry #11: Cybersecurity Analyst and Social Behaviors
Cybersecurity analysts requires just as many social skills as they does technical skills. First, networking skills are important. The better you are at networking and managing your social contacts, the better you will be at getting the job you want with the kind of perks or incentives you are looking for, whether that be pay,…
Journal Entry #10: Social Cybersecurity and Information Warfare
Information warfare is becoming increasingly prevalent in today’s society. As technology becomes more advanced, information warfare is becoming a war unto itself. Previously, it was part of a hybrid-warfare tactic involving information warfare and traditional warfare tactics, but war tactics are shifting to focus more on the informational warfare side and less on traditional warfare….
Journal Entry #9: My Thoughts on the Social Media Disorder Scale
I scored low on the social media disorder scale but still had a couple “yes” answers. For the most part, though, I don’t engage in too much social media activity. I think it has some interesting questions, but mostly targets those questions at a younger generation. I think they could change the questions to broaden…
Journal Entry #8: Social Media and Cybersecurity
The media influences people’s understanding of cybersecurity in a couple of different ways. First, I think they make it look more glamorous and exciting than it is. There are a lot of boring, repetitive things involved with cybersecurity that are not represented in the media at all. They also make it look easier than it…
Reflection Essay of Cybersecurity Ethics
There are many ethical topics we have discussed in this class concerning cybersecurity. We have examined these topics using several different ethical lenses to come to our conclusions. This allowed us to form different opinions and learn new things than if we had used our own personal ethical lenses every time. Some of the most…
CYSE-200T: Journal Entry #13
The short arm of predictive knowledge refers to the fact that it is difficult, if not impossible, to predict all the possible outcomes of an evolving, technologically-based society. One change in technology can lead to an entirely different outcome down the road that we just could not predict based on the knowledge we had at…