Category: CYSE 201S
Journal Entry #15: Digital Forensics
The path of the speaker was an interesting one. Going from accountant to digital forensics is a leap. At the same time a logical one. Many accountant has to perform work that can be considered forensics, he just jump into the digital part of it. Now is quite different, cybersecurity absorbed this area of expertise…
Journal Entry #14: Speaking of Mistake of Law
The eleven activities mention are illegal and many people practice them, especially if they are not aware. The five that I think are the worst violations are sharing passwords, addresses or photos of others, the reason most of the time is for a malicious purpose, like stalking or bullying. Bullying and trolling are another reason,…
Journal Entry #13: Bug Bounty
In recent years, the need for security researchers has skyrocketed to epic proportion. Bug bounty programs have become a necessity to help organizations in their search for a more robust security. The problem arises in the absence of vulnerabilities disclosures policies. Many researchers do not provide their findings for fear of being prosecuted. A group…
Journal Entry #12: Data breach, economic and social theories
After reading the sample letter I identified the first theory which was a veiled Denial of responsibility from the neutralization theory. The letter was written in a way that the owners of the website showed that the responsible party was the third party that provided the website services. Another one is structural functionalism. People expect…
Journal Entry #11: Cybersecurity Analyst
A cybersecurity analyst needs these five skills that come from the social spectrum. They need critical thinking, not only in technology but also in everyday life. It is imperative that a person in cybersecurity learn how to think outside the box, sometimes reality is stranger than fiction. They also need effective communication skills. You can…
Journal Entry #10: Social Cybersecurity
I think the article is spot on in terms of the way information is the new weapon of war. Many people are not happy with our regular mediums of information and use social media to stay up-to-date with what is happening around the world. Add to this the following of celebrities, bloggers, and other famous…
Journal Entry #7: Cybersecurity Human System Integration Framework
This meme relates to the Human System Integration Framework because audits are an integral part of cybersecurity. Audits, analyzes, and reviews IT Infrastructure, to help assess risk, which is part of the identification process in the NIST Framework. They also help comply with standards and regulations. They are a proactive way of threat prevention.
Journal Entry #9: Social Media Disorder Scale
After answering the 9 questions my score was 0 out of 9, with 0 being the healthier way of seeing social media. The items on the scale are preoccupation, tolerance, withdrawal, persistence, displacement, problems, deception, escape, and conflict. I think these are areas that can be affected by a variety of things, and it is…