After watching the Ted Talk from David Teo on digital forensic it gave me even more idea of what I want to do with my career in cybersecurity. To start off David was first an accountant but he was pretty decent when it came to being able to use technology. He made the leap into…
career paper
The professional career I wanna have when I get older is a Cyber defense operation job. For those who don’t know what exactly that is, here’s a brief description. In a cyber defense operation job I will be in charge of monitoring, preventing, detecting, investigating, and responding to cyber threats that happen 24/7. This has…
11 Illegal Things You Unknowingly Do on the Internet
After viewing Andriy Slynchuk article and 11 illegal things we do online, I have selected a few that seem the most serious. The five I selected are faking identity online, collecting information about children, recording a VoIP call without consent, illegal searches on the internet and using other people’s internet networks. The reason these five…
SAMPLE BREACH NOTIFICATION
After reading the letter being presented, I’m going to say the letter demonstrated the Laissez-fare economic theory and rational choice. The Laissez-fare by definition means “ version of classical theory that suggests “government should not intervene in the economy except to protect individuals’ inalienable rights”. This is shown in the letters “what are we doing?”…
BUG BOUNTY
To keep things short, the study of Bug bounties has a great ring to it but could possibly use some improvement. Basically individuals are being paid to expose the weaknesses within a companies infrastructure before some who is actually a bad hacker gets into it first. But it has its pluses and negatives. Yes you…
Read this and write a journal entry summarizing your response to the article on social cybersecurity
After reviewing the article, I can say social cybersecurity is something that is starting to take the world by storm. Like the article said this is more of a cognitive hacking rather than technology vs technology. Human vs human hacking is something that has been going on for a while, but is just now getting…
Watch this video. As you watch the video, think about how the Description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
After watching the video, cybersecurity analysts have one of the toughest jobs in the industry. Being in charge of the amount of data stored in computers, hard drives, and the internet is a big deal. They contribute to monitoring and mitigating what a potential can do or have already done. Being an analyst allows for…
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
Name: Omarion BranchDate: 11/5/2022DetailsAfter completing the Social media disorder scale, I scored a 5. I was actually very surprised with even scoring that high honestly. The items on the scale were fairly good questions to ask because you don’t really think much of them. But results could vary depending where you are in the world…
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
After watching the video the media definitely tries to make cybersecurity seem like something that can be done quickly and easily. Even within the first couple clips Keren says that the realism is there but they just shorten it up in the movies to give the false interpretation that it can happen quickly. The media…
article review 2
The article I will be using for this paper is “The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence”. Within this paper we talk about the evolution of technology and how we have to step our game up as humans in order to keep up with the advancement. As…