ePortfolio

Category Uncategorized

Digital Forensics and Social Science

While watching Davin Teo’s TEDx talk on digital forensics, I found his career path very intriguing. During his talk, Teo described how he got started in the field of digital forensics, starting with his early fascination with computers and technology… Continue Reading →

Illegal Things Internet Users Unknowingly Do

The five most severe offenses among the illegal activities done by internet users are sharing passwords, addresses, or photos of others; bullying and trolling; recording a VoIP call without consent; collecting child information; and running illegal searches on the internet…. Continue Reading →

Bug Bounties Economic Model for Cybersecurity

In “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties,” Kiran Sridhar and Ming Ng discuss how to build an economic model for bug bounties using data from HackerOne, a platform for vulnerability coordination and… Continue Reading →

Data Breaches and Economic/Social Theories

Customers who visit the website www.glasswasherparts.com are notified of a data breach. The breach happened between February and December 2016 but was found in November. Hackers could obtain their clients’ credit card information by installing malware on the server platform…. Continue Reading →

Cybersecurity Analysts and Social Behaviors

In Nicole Enesse’s YouTube video “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” several social elements highlight the connections between cybersecurity and social behavior. Firstly, the focus on teamwork and communication emphasizes how crucial relationships are for… Continue Reading →

Social Cybersecurity

Lt. Col. David M. Beskow and Kathleen M. Carley’s “Social Cybersecurity: An Emerging National Security Requirement” explores social cybersecurity as an essential component of national security. This article stresses the necessity for a strategy to address these issues by highlighting… Continue Reading →

Social Media and Cybersecurity

When taking the Social Media Disorder Scale, I scored a two out of nine. I said yes to persistence and displacement traits, neglecting other activities to use social media and trying to use social media but failing. I think the… Continue Reading →

Media Influences on Cybersecurity

In today’s digital era, where technology is ingrained in every part of our lives, the media is crucial in influencing how we perceive cybersecurity. Thinking back on how the media shapes our understanding of cybersecurity, it is clear the media… Continue Reading →

Cybersecurity Memes

The man in this first meme is a cybercriminal. He is setting up a fake network disguised as the Starbucks network to bait victims into connecting. The man hs a devious grin on his face as he executed this phishing… Continue Reading →

Spotting Fake Websites

When determining whether a website is real or fake, there are a couple of identifiers to help someone avoid fake, shady websites. Firstly, checking the domain can identify whether a website is fake. Fake websites will try to resemble the… Continue Reading →

« Older posts

© 2025 Noah Salafranca — Powered by WordPress

Theme by Anders NorenUp ↑