People with cybersecurity-related jobs often take unique pathways to get to their jobs jobs. While some may have a degree in that field or certifications, many people don’t start out that way. Davin Teo talks about his route to becoming a digital forensics investigator in his TED talk. He started out as an accountant and…
Category: CYSE 201S
Journal Entry #14: Illegal Things People Do On the Internet
There are many things you can do on the internet that, at best fall into a gray area of legality and at worst, are completely illegal. One of the worst things, in my opinion, is collecting information about children. There is no reason anyone should be collecting data about minors. That is an absolute invasion…
Journal Entry #13: Bug Bounty Policies
Bug bounty policies are policies made by companies that offer the promise of no retaliation or legal repercussions for people that discover and tell them about bugs in their software. Many companies offer money and other incentives for people, often freelance hackers, to do this for them. This gives them many people to search for…
Journal Entry #12: Economic Theories, Social Science Theories, and Data Breaches
There are different economic theories and social science theories that relate to a data breach notification letter. Rational choice theory is the first theory that comes to mind. This is the theory that an individual or business will make choices that are in their best interest. This could apply to both the person committing the…
Journal Entry #11: Cybersecurity Analyst and Social Behaviors
Cybersecurity analysts requires just as many social skills as they does technical skills. First, networking skills are important. The better you are at networking and managing your social contacts, the better you will be at getting the job you want with the kind of perks or incentives you are looking for, whether that be pay,…
Journal Entry #10: Social Cybersecurity and Information Warfare
Information warfare is becoming increasingly prevalent in today’s society. As technology becomes more advanced, information warfare is becoming a war unto itself. Previously, it was part of a hybrid-warfare tactic involving information warfare and traditional warfare tactics, but war tactics are shifting to focus more on the informational warfare side and less on traditional warfare….
Journal Entry #9: My Thoughts on the Social Media Disorder Scale
I scored low on the social media disorder scale but still had a couple “yes” answers. For the most part, though, I don’t engage in too much social media activity. I think it has some interesting questions, but mostly targets those questions at a younger generation. I think they could change the questions to broaden…
Journal Entry #8: Social Media and Cybersecurity
The media influences people’s understanding of cybersecurity in a couple of different ways. First, I think they make it look more glamorous and exciting than it is. There are a lot of boring, repetitive things involved with cybersecurity that are not represented in the media at all. They also make it look easier than it…
Journal Entry #6: How to Spot a Fake Website
There are several things to look for when trying to identify if a website is a fake website or a true website that can be trusted. One thing to look for is the domain name. Does the domain actually say what it should, for example, google.com or maybe it is something similar like g00gle.com? A…
Journal Entry #5: Cybercrime Motivators
People can commit cybercrimes for a variety of reasons. These reasons can change from person to person or even from crime to crime. The following is how I would place the 7 motivations (money, multiple reasons, political, revenge, boredom, entertainment, and recognition) in order from most motivating to least motivating reasons for committing crimes.