Cybersecurity Analysts The role of a Cybersecurity Analyst As a cybersecurity analyst, this specific career takes on many roles for companies, businesses, organizations, and individuals. Cybersecurity analysts analyze computer systems to discover new threats, vulnerabilities, and risks that may leading to a potential cyberattack. They analyze computer systems with tools and software, then they report…
Week #15 Journal Entry
In David Teo’s TEDtalk, he talks about how back then the career of digital forensics did not have college courses. In order to get into this specific field you had to fall into it with another field, in which David fell into the field of digital forensics through accounting and his father also told him…
Week #14 Journal Entry
Even though all violations on this list are equally serious, their are five violations on the list that are the most serious. The first one is sharing passwords, addresses, or photos of other people without their consent. When sharing sensitive information about others to other people through messaging, social media, or on the internet in…
Week #12 Journal Entry
In the letter, one economic theory associated with the letter is the supply and demand theory. The reason why this theory is associated with the letter is because in the letter there were multiple online purchases from customers toward the glass company. Another economic theory is classical economical theory because the company produced glass washer…
Week #11 Journal Entry
There are many social themes that are mentioned in the video provided. One is that cybersecurity analyst may have to teach awareness about cybersecurity to other employees working in a company, so that they can be aware of potential risks and dangers of malicious sites and networks. When taught about cybersecurity, employees can protect themselves…
Article Review #2
Article Review #2 – The intersection of young adults and cybercrime Social sciences toward the issue of young adults in cybercrime The article talks about how young adults usually around college-age have a deep relationship with their phones and social media for either communication, connection, entertainment, or work. With this deep relationship of technology and…
Week #10 Journal Entry
On the social media disorder scale, I scored a four out of nine, which is close to a five out of nine which is required to be diagnosed with social media disorder. I think that some of the questions on the scale related to me like how I tried to slow down my social media…
Week #8 Journal Entry
Media like social media, movies, podcasts, and even video games can alter our view of cybersecurity and our understanding of how it works. Media has some positive impact on individuals when consuming the media about cybersecurity. For example, media can show real life information about cybersecurity including tactics, terms, tools, and even real-life cyber-attacks. This…
Week #6 Journal Entry
Fake websites may consist of misspelled domain website names, multiple grammatical errors, and spelling errors, and a misleading green SSL security lock icon. Real websites contain a valid SSL certification, the proper website domain name, professional design, proper spelling, and grammar for clear communication. In comparison, fake website will show a false lock icon on…
Article Review #1- The Integration of Artificial Intelligence and Cybercrime
The relation of A.I and cybercrime to social sciences This article explains how AI is exploited by criminals to commit cybercrimes against individuals in society. Examples of the exploitation of AI by criminals are through two studies. The first study talks about an article titled “Victimization by Deepfake in the Metaverse: Building A Practical Management…