Social science refers to the scientific study of human society. It is the science of people or the collections of people and their individual or collective behaviors. Social science can be classified into different scientific disciplines such as anthropology, criminology, economics, geography, political science, psychology, and sociology, just to name a few. Cybersecurity, also known…
Author: nfloo002
Journal Entry #15
Digital forensics is defined as the process of uncovering and interpreting electronic data. The overall goal of the process is to preserve any and all evidence in its most original form while performing a structured investigation by collecting, identifying, and validating the digital information to reconstruct events that occurred in the past. The career field…
Cyber Security Readiness and Human Rights in Iraq
The second study is taken from the Journal of Cyber Criminology. The article is titled “Cyber SecurityReadiness in Iraq: Role of the Human Rights Activists.” In this empirical research study, the hardshipsexperienced by the Iraqi human rights fraternity was discussed. The group has opposed and stood against the passage of the anti-cybercrime draft law on…
Journal Entry #14
An article written by Andriy Slynchuk explained eleven things that users unknowingly do on the Internet. The Internet is something that is used commonly in our lives. However, there are many activities and things that we can do unknowingly on the Internet that are against the law. These include using unofficial streaming services, using torrent…
Journal Entry #13
The sample breach report that was given explained how personal data and information was stolen from intruders using the website www.glasswasherparts.com. It explained that malware was placed on the platform provider’s servers and that it was used to gain access to payment card data of the customers that use it. One economic theory that relates…
Journal Entry #12
Bug bounty programs are used by companies to pay freelance security researchers or hackers in exchange for reporting vulnerabilities that are found in their systems and infrastructure. They have become very popular over the years. These programs are designed because it is more cost-efficient for companies to pay someone a one-time cash reward instead of…
Journal Entry #11
This video went into detail about what a cybersecurity analyst does, the average salary for the role, and how someone can gain experience to become a cybersecurity analyst. There are ways in which the job role relates to some social behaviors. With cybersecurity, in general, there will always be change. This will require the person…
Journal Entry #10
The featured article went into depth about what social cybersecurity was and about how it could be used in wars as a weapon. In the article, social cybersecurity was defined and explained in how it differs from traditional cybersecurity. Traditional cybersecurity involves humans using technology to “hack” other technology. With social cybersecurity, it involves humans…
Journal Entry #9
As someone that does not use social media whatsoever, I didn’t really place on the Social Media Disorder Scale. I think that the items in the scale accurately reflect some of the signs and symptoms of those that are addicted to social media. People often feel frustrated and cut off when they don’t have access…
Journal Entry #8
I think that hacker-themed movies portray a false stereotype of cybersecurity. Cybersecurity, as a career field and industry, is not just about people hacking other people and where they get tons of information and money. Movies like Mr. Robot, for example, portray cybersecurity through the wrong lens. Cybersecurity is complex and it has different areas…