Let us start by defining this career. What is the difference between Ethical Hacking andPenetration Testing? They are the same but not the same. “Pen testing focuses on identifyingrisks. Ethical hacking concentrates on identifying risk and showing and demonstrating theexploitation” (Singh, 2023). “They have their place in cybersecurity and identifying securitythreats and vulnerabilities” (Singh, 2023)….
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
My five serious violations are collecting information about children, faking your online identity, using torrent services, using unofficial streaming services, and sharing passwords, addresses, or photos of others. My first is collecting information about children this I feel is everybodys number one choice just of the fact if how much information you can get nowadays…
Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
The Bug Bounty Policy is a program incentive that hires individuals or companies to hack them for a price or even exposure to let the company be investigated for their vulnerabilities. Very few individuals did not care for a high monetary compensation. They wanted more exposure to help build their reputation and get more jobs…
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter“SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
I think that the Marxian economic theory relates to this letter because those who are of power are the people who put the malware into the third party allowing them to have access to those with no power just trying to use the site. Rational choice, these people chose to put malware into the systems…
Read this and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/CYSE201S 6
Social cybersecurity is a growing subdomain of national security that is said to affect all levels of future warfare. Focused on science to understand why changes happen in human behavior, social, cultural, and political outcomes. With technology improving every year it is becoming harder to know what is going on, and why things are happening…
As you watch the video HTTPS://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors.
Cybersecurity analyst is the first line of defense protecting computer networks from attacks and unauthorized access, front desk, and paperwork, which is different for every company. Identifying flaws and problems with the security system is in the job description. It relates to social behaviors with how you have to work as a team player, helping…
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I completed the scale and scored a two. The items in the scale are just normal questions asking about your social media use. Different patterns are found across the world because of the different technologies, and the way people are raised.
Write a journal entry about how you think the media influences our understanding of cybersecurity.
Media influences our understanding of cybersecurity a whole lot. Most of the accusations come from movies and TV shows where they do right for some of it, then overshoot the next part. Most media has cybersecurity wrong nowadays they overdue the animations for objects and things do not work how they are supposed to work….
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
What makes a fake website fake is the URL this is the main way to spot a fake website, the way the site looks and is designed can be a clear tell also, and if there isn’t a lock symbol next to the URL is a great sign. Real websites will have all of these…
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
For my number one I have revenge it is here because of the fact that people want to get back for what was done wrong to them. Money is my number two because of how greedy people can be and how they want everything to themselves. For multiple reasons is my third people will have…