Cybersecurity and the Social Sciences
Journal #11
Prompt: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
what the job does. A cybersecurity analyst is one of the first-line defenses that protects
a network against cyber threats. A cybersecurity analyst also responds and points out
flaws in a company’s security system. The presentation talks about how this job
provides training for user awareness, which is a social aspect of the job. Providing user
awareness helps people become less vulnerable to cyber threats. Social themes like
adaptation and trust are important for a cybersecurity analyst. If you can adapt to any
situation and build trust with your company, you will be a more efficient security analyst.
Journal #12
Prompt: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological science theories relate to the letter.
Marxian economic theory and the classical economic theory. I think this letter relates to
the Marxian theory because the letter explains how their third-party providers
experienced a data breach and how the customers information could have been stolen.
This is an example of people with power (in this case, individuals who are more
tech-savvy) exploiting those without power and attacking their vulnerabilities as
customers. This relates to the classical theory because cybercriminals act under the
same logic of taking risks for potential financial gain.
This letter also relates to two psychological theories. The neutralization theory and the
reinforcement sensitivity theory (RST). Regarding the neutralization theory, the
individuals who caused the company’s data breach could have thought what they were
doing was really not that bad as long as no one got hurt or injured. The RST relates to
the letter because the individuals could have committed this crime because of their
impulsive nature and because they were interested in the reward (the customers’
information).
Journal #13
Prompt: Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
hygiene habits and a good way for vulnerabilities that may have been overlooked by the
company to be exposed. I also think it is interesting that the article mentioned how
hackers are not very concerned about the price they are paid for bug bounties, which
gives small companies with a smaller budget the opportunity to still benefit from bug
bounty programs. When I read that, I noticed that most black hat hackers hack for
financial gain, but these white hat hackers doing bug bounties do not seem to care for
money as much as black hat hackers. The article also mentions how new bug bounty
programs do not get noticeably more or fewer reports than older ones, so companies
can still benefit even as more programs launch.
Journal #14
Prompt: Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Out of all of the 11 offenses mentioned, I believe these five are the most serious: using
unofficial streaming services, collecting information about children, illegal searches on
the internet, using copyrighted images, and sharing passwords, addresses, or photos of
others.
- Usage of unofficial streaming services: I believe using unofficial streaming
services is serious because you are watching stolen content for free, and the
creators of the content are not getting paid when illegal websites are used. Also,
your information could get stolen just like the content you’re watching was. - Collection of information of children online: Collecting information about
children violates the Children’s Online Protection Act, which is very serious and
can result in tens of thousands of dollars in fines. - Illegal internet searches: Illegal internet searches are serious because they
could eventually land you in jail. - Using copyrighted images: Using copyrighted images without permission or
paying is serious because this is copyright infringement, and this can result in
criminal penalties. - Sharing passwords, addresses, or photos of others: Participating in these
acts compromises the privacy of individuals and could put them in danger,
whether that was your intention or not.
Journal #15
Prompt: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
into digital forensics. The speaker was not sure what digital forensics was at the time
when he got offered the position, but he thought it would be something good for him. It
is cool to see how his career has played out because he was not looking to be in digital
forensics; the opportunity came to him, and he was able to work at one of the first digital
forensic companies in Australia.
A career as a digital forensic investigator is related to the social sciences because it
involves investigating crimes and social issues. The social science principles are used
by digital forensic investigators by allowing them to understand human behavior in
relation to the crimes and enhance investigations, to name a few.
