DISCUSSION BOARD: Protecting Availability Making regular backups, having extra hardware, and strong security measures are super important. They help stop system failures, and data loss and keep out unwanted people. So, the systems are always there for you. To ensure the systems are always available, we use different safeguards like making regular backups, having extra…
Article Review #2
Njomi Mukete11/17/2024Professor YalpiCYES201S Article Review #2 Article Review 2 Cyberbullying and Cyberbullicide Ideation Among Jordanian College StudentsCyberbullying and Cyberbullicide Concept among Jordanian College Students.IntroductionBut the number of cyberbullying incidents in recent years has been rising especiallyamong kids and college students. This act – aka cyberbullying, using the digital environment tothreaten, abuse, and bully someone –…
Article Review #1
Njomi MuketeCYES201SProfessor Yalpi10/2/2024 Article Review 1One of these articles comes from the International Journal of Cyber Criminology, thejournal of choice to learn how the Internet changes the dynamics of crime, criminals, andcriminal organizations-which is, after all, why cybercrime has become a serious and fascinatingarea of social science research. It has been argued that the issue…
Career Paper
Njomi Mukete11/24/2024 Cloud Security AnalystIntroductionAs a Cloud Security Analyst in the modern connected world, this position is more important thanever. With more and more enterprises shifting to the cloud, it is not just the protection ofinformation and privacy that has increased but also the prevention of hacking. Cloud SecurityAnalysts are primarily interested in technical things…
Week 15 – Journal Entry 15
The Davin Teo talk on Digital Forensics was a TEDx talk that made me interested in how he got to this point, and the intersection between his career and the social sciences. Davin’s career in digital forensics started out in computer science, but it was his knowledge of human behaviour and social effects that really…
Week 12 – Journal Entry 14
Andriy Slynchuk’s 11 Illegal Things You Never Think Of On The Web identifies some illegal things that many might never think about online. Downloading pirated content, torrenting, breaking into accounts, cyberbullying, and malware are 5 of the worst violations. Piracy and torrenting are bad because they infringe on creators’ rights to make money. Account hacking…
Week 10 – Journal Entry 11
When analyzing cybersecurity, a wide range of social dynamics matter. Analysts are often grouped to discover and eliminate security threats, so communication and collaboration are key. It’s also about trust, as analysts work with sensitive data and have to keep it accurate and private. Then there’s the morality issue, since analysts have to strike a…
Week 10 – Journal Entry 10
I just read this piece by Lt. Col. David M Beskow and Kathleen M Carley, on social cybersecurity, and it really makes you see how much we have to factor in social components of cybersecurity. They note that as the threats to social systems and human nature increase, we must attend not so much to…
Week 9 – Journal Entry 9
A commonly used instrument to identify problematic social media use is the Social Media Disorder (SMD) scale, which assesses excessive involvement in, or engagement with, social media, as well as various negative consequences and aspects of problematic social media use, such as escape use (ie, use of social media to avoid negative moods or feelings)….
Week 5 – Journal Entry 5
Here are the motives in order from most reasonable to less so: