Category: CYSE201

Journal Entry #11

 Think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. The social themes that arise in the presentation are that when she talked about the responsibilities of a cybersecurity analyst, such as preventing phishing attacks and researching flaws in the …

Continue reading

Journal Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity  https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. I found this article to be interesting because, especially in the time of war, social cybersecurity is important. After all, we have adversaries like Russia that will spread misinformation on social media platforms and …

Continue reading

Journal Entry #9

After taking the Social Media Disorder Scale I scored a 5 out of 9 which means that I fit the criteria to be formally diagnosed as a disordered social media user. In my opinion, I believe that the items in the social media disorder scale are accurate when it comes to social media users like …

Continue reading

Journal Entry #8

After watching the video twice, the media makes it seem that hacking is easier than it is in the scene in Mr.Robot where the character hacked the register quickly. I feel like how a show like Ocean 8 included accurate hacking like spearfishing when she sent the phishing email. I also noticed that some of …

Continue reading

Journal Entry #6

The difference between a real website and a fake website is that a real website has a padlock next to the URL while a fake website doesn’t have the padlock next to it. A fake website would send you phishing emails that ask for personal information like credit card numbers, social security numbers, and login …

Continue reading