Category: Journal and Free Writes

What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook

Video Review: https://www.youtube.com/watch?v=iYtmuHbhmS0Reflecting on the video discussion on the who, what, and where of the cyber security analyst Job.You can see where, within the social sciences, economics and sociology come into play. Be it the willingness to work graveyard shifts due to your individual proclivities or the salary for an entry level position. There are not many jobs that have… Read more →

What is GUARD?

From the video https://www.youtube.com/watch?v=RMsQs69pMDQ&t=8sFrom the perspective of the cyber security analyst, the economics, political science and sociology elements of the entire supply change must be considered in order to secure the process as a whole. This mitigates the economic impact on the company, from back door attacks through a third party vendor. The political science aspects come into play when… Read more →

Andriy Slynchuk: things Internet users do that may be illegal.

Listing the five violations of Internet users from Slynchuk’s list that I see as the most egregious. From worst to least.1: Number 9-Collecting information about children. As a father and grandfather, the protection of children is very important to me, and anyone who would traffic in or abuse children, rank as the worst of the worst for me.2: Number 4-Sharing… Read more →

Bug Bounty Policies

Article: Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties by Kiran Sridhar and Ming NgThis articles focuses on the speakers research into how bug bounties effect businesses. Though the finance, retail, and healthcare sectors had a minor deviance of 5% from other industries, all industries performed similar. The speakers in the research article established… Read more →

Sample Data Breach Notification Review

After reviewing the sample data breach notification, the two primary aspects of both economics theory and the social sciences that I see emphasized by it are:Economics:1: Keynesian Theory– Reflecting the need for governmental rules and regulations forcing stricter adherence to cyber security practices.2: Laissez-Fare Theory– As a means of checks and balances against governmental over reach.Social Science:1: Economics- What impact… Read more →

Workplace Deviance Discussion Board

Workplace Deviance has expanded, in some ways, with the introduction of cyber technology. Businesses, schools and governments have always had a vested interest in how their employees spend their working time and as such have developed a menagerie of policies meant to keep deviance within acceptable norms. However, with the introduction of cyber technology there has become an influx of… Read more →

The “Short Arm” of Predictive Knowledge Discussion Board

In the Reading: The speaker makes a concerted effort to identify the difference between the technological age and history. Given by the great scope of time, cyber technology is barely a blip on the radar. Historically questions of ethics and morality were always close to home. As the speaker explains, the farmer is not removed from the field, he is… Read more →

Reflecting on Social Cyber Security

Misinformation has always been a concern on the world stage. With the advent of the cyber realm, this concern has been propelled to the fore front of many national security professionals minds. Their are active information conflicts happening around the globe. Its cheaper than conventional warfare. Requires very few personnel to pull off and can reach anywhere in the world… Read more →