Journals Contd.

Cybersecurity and the Social Sciences

Journal #11

Prompt: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

The description of the cybersecurity analyst job relates to social behaviors because ofwhat the job does. A cybersecurity analyst is one of the first-line defenses that protectsa network against cyber threats. A cybersecurity analyst also responds and points outflaws in a company’s security system. The presentation talks about how this jobprovides training for user awareness, which is a social aspect of the job. Providing userawareness helps people become less vulnerable to cyber threats. Social themes likeadaptation and trust are important for a cybersecurity analyst. If you can adapt to anysituation and build trust with your company, you will be a more efficient security analyst.

 

Journal #12

Prompt: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological science theories relate to the letter.

I think the economic theories that relate to the data breach notification letter are theMarxian economic theory and the classical economic theory. I think this letter relates tothe Marxian theory because the letter explains how their third-party providersexperienced a data breach and how the customers information could have been stolen.This is an example of people with power (in this case, individuals who are moretech-savvy) exploiting those without power and attacking their vulnerabilities ascustomers. This relates to the classical theory because cybercriminals act under thesame logic of taking risks for potential financial gain.This letter also relates to two psychological theories. The neutralization theory and thereinforcement sensitivity theory (RST). Regarding the neutralization theory, theindividuals who caused the company’s data breach could have thought what they weredoing was really not that bad as long as no one got hurt or injured. The RST relates tothe letter because the individuals could have committed this crime because of theirimpulsive nature and because they were interested in the reward (the customers’information).

 

Journal #13

Prompt: Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

I think bug bounty policies are a good way for companies to maintain good cyberhygiene habits and a good way for vulnerabilities that may have been overlooked by thecompany to be exposed. I also think it is interesting that the article mentioned howhackers are not very concerned about the price they are paid for bug bounties, whichgives small companies with a smaller budget the opportunity to still benefit from bugbounty programs. When I read that, I noticed that most black hat hackers hack forfinancial gain, but these white hat hackers doing bug bounties do not seem to care formoney as much as black hat hackers. The article also mentions how new bug bountyprograms do not get noticeably more or fewer reports than older ones, so companiescan still benefit even as more programs launch.

 

Journal #14

Prompt: Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Out of all of the 11 offenses mentioned, I believe these five are the most serious: usingunofficial streaming services, collecting information about children, illegal searches onthe internet, using copyrighted images, and sharing passwords, addresses, or photos ofothers.

  1. Usage of unofficial streaming services: I believe using unofficial streamingservices is serious because you are watching stolen content for free, and thecreators of the content are not getting paid when illegal websites are used. Also,your information could get stolen just like the content you’re watching was.
  2. Collection of information of children online: Collecting information aboutchildren violates the Children’s Online Protection Act, which is very serious andcan result in tens of thousands of dollars in fines.
  3. Illegal internet searches: Illegal internet searches are serious because theycould eventually land you in jail.
  4. Using copyrighted images: Using copyrighted images without permission orpaying is serious because this is copyright infringement, and this can result incriminal penalties.
  5. Sharing passwords, addresses, or photos of others: Participating in theseacts compromises the privacy of individuals and could put them in danger,whether that was your intention or not.

Journal #15

Prompt: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

I think it is interesting how the speaker started in an accounting practice before goinginto digital forensics. The speaker was not sure what digital forensics was at the timewhen he got offered the position, but he thought it would be something good for him. Itis cool to see how his career has played out because he was not looking to be in digitalforensics; the opportunity came to him, and he was able to work at one of the first digitalforensic companies in Australia.A career as a digital forensic investigator is related to the social sciences because itinvolves investigating crimes and social issues. The social science principles are usedby digital forensic investigators by allowing them to understand human behavior inrelation to the crimes and enhance investigations, to name a few.