Category: Uncategorized

Journal Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTube After watching the video, I found it interesting how he explained digital forensics, which is the process of collecting and analyzing evidence that helps with legal proceedings. In my opinion, I found his pathway to his career to be interesting, especially since he originally started in accounting …

Continue reading

Journal Entry #14

Andriy Slynchuck has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The 5 worst illegal violations in my opinion would be illegal searches online. bullying and trolling, using torrent services, and …

Continue reading

Journal Entry #13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using …

Continue reading

Journal Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The economic theories that relate to this letter would be Laissez-Faire theory and rational choice. The theory of Laissez-Faire relates to the letter because the Glass …

Continue reading

Career Paper

Nadia Simpson CYSE201S 4/7/2024 Career Paper Cybersecurity is a growing career field in which the demand is increasing due to the risk ofcyber threats and cyberattacks from adversaries. Cybersecurity is also a growingcareer field in which the U.S. Bureau of Labor Statistics “projects cybersecurity jobs will growby 32% from 2022 to 2032, equating to 16,800 …

Continue reading

Journal Entry #7

Meme for the photo: Training the new employees is so difficult This meme relates to the human-centered cybersecurity framework because training employees on cybersecurity practices is important to mitigate risks and prevent human error. Training employees can help mitigate risks by showing them what unusual activity looks like and how to detect and prevent a …

Continue reading

Journal Entry #5

1- Political 2. Money 3. Revenge 4. Recognition 5. Multiple Reasons 6. Entertainment 7. Fun I ranked all the motives the way I did because hacking for political reasons made the most sense. After all, it helps support movements, exposes corporations, and shuts down apps that support right-wing extremists and hate groups. I ranked fun …

Continue reading

Journal Entry #4

Maslow’s hierarchy of needs talks about the needs that humans have and their motivations behind those needs. Maslow’s hierarchy of needs starts with Physiological needs and ends with self-actualization. With self-actualization when it comes to technology, I can engage with my hobbies like listening to music, shopping, and playing video games. Physiological needs are like …

Continue reading

Journal Entry #3

PrivacyRights.org shows the laws in different states when it comes to data and their privacy. The website also shows the most common types of data breaches and the companies that have the most data breaches. I feel like researchers can use this information to come up with methods to prevent the amount of data breaches …

Continue reading

Journal Entry #2

When it comes to the intersection of cybersecurity and principles of science, the principle of parsimony stood out to me the most. In cybersecurity, it is important to analyze the underlying reasons why individuals commit cybercrimes. The PowerPoint discusses self-control theory which states the people commit crimes specifically cybercrimes due to a lack of a …

Continue reading