11 Illegal things you unknowingly do on the Internet

In his article, Andriy Slynchuk gives a list of eleven online activities that turn out to be illegal and explains the possible consequences for such actions, with tips on how one can stay safe online. Why the internet needs laws and regulations is simply because it is an integral part of our lives. According to…

Digital Forensics

This video on digital forensics gives a representation of the field in detail by marking the importance of digital evidence in legal cases and the practical challenges set for an investigator. When reflecting upon the speaker’s pathway to a career in digital forensics, it shows just how deeply interlinked this really is with the social…

The Role of Social Science in the Career of a Security Engineer

Introduction Security Engineers are at the front line of defense against cyber threats aimed at organizations. Their role exceeds the practice of technical skills, requiring an in-depth understanding of social science principles. This paper discusses how Security Engineers rely on social science research and principles, mainly delving into human factors, psychology, victim behavior, and phishing…

Bug Bounty Policies

What is a Bug bounty program? According to the hackerone.com site, it is an opportunity for ethical hackers to employ their skills and discover vulnerabilities or bugs in an application in exchange for a monetary reward. Bug bounty program has become an increasingly significant cybersecurity strategy. Its policies invite ethical hackers to use their penetration…

Sample Data Breach Notification

Data breaches greatly impact both economic and social landscapes. I will be exploring how a sample data breach notification letter relates to Marxian and Keynesian economic theories, and Sociological and Socio-Technical Systems (STS) theories. The Marxian economic theory highlights the conflicts and power struggles typical of capitalist societies. In relation to data breaches, large companies…

Article Analysis

Phishing is a serious threat to, in particular, public organizations like municipalities, causing disruption of operations and potential data leakage. This paper discusses the understanding of risk profiles of phishing within a Dutch municipality and how these risks can be reduced by voluntary e-learning. An experiment was conducted where employees in two test phishing emails…

Social Cybersecurity – An Emerging National Security Requirement

The article “Social Cybersecurity – An Emerging National Security Requirement” emphasizes the reality that social cybersecurity forms a core in modern conceptualizations of warfare and how information operations are currently reshaping societal behavior and outcome. In this regard, it is done by reviewing how marches in technology increase the sophistication of information operations beyond conventional…

What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook

In exploring the role of Cybersecurity Analyst it becomes clear that one needs to become a digital guardian of integrity and societal trust. Based on the video, a cybersecurity analyst must protect society against cyber threats by monitoring networks for any kind of suspicious activity that may put sensitive information in danger. The technical responsibilities…

Social Media Disorder

After I took the Social Media Disorder Scale, I had only made a “Yes” mark on question number 4: if one has ever tried harder not to spend as much time on social media but failed. All other questions were “No.”. This means that while I do not exhibit so many symptoms of social media…

Hacking Movies – Are they Real?

Media plays a significant role in shaping our understanding when it comes to cybersecurity. Movies tend to dramatize hacking in order to create exciting scenes, which can lead to misconceptions. Older movies such as “Wargames” (1983) portray hacking as a simple endeavor where a boy uses someone else’s credentials found on a piece of paper….

Misconceptions in Cybersecurity

First of all, Keren, in the video “Hacker Rates 12 Hacking scenes in movies and TV”, presented scenes and really broke down to details what is realistic, and what was just made to look spectacular for the audience. As far as misconceptions go, I’m sure we all had some. Before I started studying Cybersecurity, I…

Annotated Bibliography

Spithoven, R., & Drenth, A. (2024). Who will take the bait? Using an embedded, experimentalstudy to chart organization-specific phishing risk profiles and the effect of a voluntarymicrolearning among employees of a Dutch municipality. Journal of Cybersecurity, 10(1).https://doi.org/10.1093/cybsec/tyae010 Any form of phishing is just an entry point to other crimes, including hacking and ransomware. As such,…

Motives for Cyber Crime

First of all, I’d like to point out that ranking motives from the most logical to least logicalmight be objectively difficult as we all perceive these motives from a different point ofview. What may be completely illogical to me, may be considered the most logical toyou, and vice-versa. That being said, I’ll try to do…

Maslow’s Hierarchy Of Needs

Abraham Maslow was an American psychologist who explained human motivation through a pyramid structure with five segments, starting from the most essential needs going all the way up towards human wants. These segments focus on physiological needs at the very bottom, followed by safety, love, esteem, and self-actualization. The Physiological need is mainly focusing on…

PrivacyRights.org and its benefits

The site in question is a database containing publicly disclosed data breaches. Some of the information provided is when the breach happened, what information was compromised, and who was involved. This information can be useful to researchers as they could outline the frequency of the violations, how impactful these breaches were for individuals and businesses,…

Principals of Science

Relativism is an ideology suggesting that truth is based on perspective, context, or evenframework. When it comes to security itself, different organizations have different needs.A local bakery may not need more than an antivirus to protect its online system, whilethe military requires encryption, firewalls, intrusion detection systems, as well asintrusion prevention systems. This is just…

NICE Framework

Upon reviewing NICE Workforce framework my top three choices would be Investigate, Securely Provision and Protect and Defend, while the least interesting framework appears to be the very first one on the list, Analyze. Investigate The most interesting aspect about the Investigate framework is related to Cyber investigation. One of the abilities listed as required…