Nadia Simpson

Author's posts

Journal Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTube After watching the video, I found it interesting how he explained digital forensics, which is the process of collecting and analyzing evidence that helps with legal proceedings. In my opinion, I found his pathway to his career to be interesting, especially since he originally started in accounting …

Continue reading

Journal Entry #14

Andriy Slynchuck has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The 5 worst illegal violations in my opinion would be illegal searches online. bullying and trolling, using torrent services, and …

Continue reading

Journal Entry #13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using …

Continue reading

Journal Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The economic theories that relate to this letter would be Laissez-Faire theory and rational choice. The theory of Laissez-Faire relates to the letter because the Glass …

Continue reading

Career Paper

Nadia Simpson CYSE201S 4/7/2024 Career Paper Cybersecurity is a growing career field in which the demand is increasing due to the risk ofcyber threats and cyberattacks from adversaries. Cybersecurity is also a growingcareer field in which the U.S. Bureau of Labor Statistics “projects cybersecurity jobs will growby 32% from 2022 to 2032, equating to 16,800 …

Continue reading

Journal Entry #11

 Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. The social themes that arise in the presentation are that when she talked about the responsibilities of a cybersecurity analyst, such as preventing phishing attacks and researching flaws in the …

Continue reading

Journal Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. I found this article to be interesting because, especially in the time of war, social cybersecurity is important. After all, we have adversaries like Russia that will spread misinformation on social media platforms and …

Continue reading

Journal Entry #9

After taking the Social Media Disorder Scale I scored a 5 out of 9 which means that I fit the criteria to be formally diagnosed as a disordered social media user. In my opinion, I believe that the items in the social media disorder scale are accurate when it comes to social media users like …

Continue reading

Journal Entry #8

After watching the video twice, the media makes it seem that hacking is easier than it is in the scene in Mr.Robot where the character hacked the register quickly. I feel like how a show like Ocean 8 included accurate hacking like spearfishing when she sent the phishing email. I also noticed that some of …

Continue reading

Journal Entry #7

Meme for the photo: Training the new employees is so difficult This meme relates to the human-centered cybersecurity framework because training employees on cybersecurity practices is important to mitigate risks and prevent human error. Training employees can help mitigate risks by showing them what unusual activity looks like and how to detect and prevent a …

Continue reading