Digital Forensics with the Social Sciences

After watching the Ted Talk from David Teo on digital forensic it gave me even more idea of what I want to do with my career in cybersecurity. To start off David was first an accountant but he was pretty decent when it came to being able to use technology. He made the leap into…

career paper

The professional career I wanna have when I get older is a Cyber defense operation job. For those who don’t know what exactly that is, here’s a brief description. In a cyber defense operation job I will be in charge of monitoring, preventing, detecting, investigating, and responding to cyber threats that happen 24/7. This has…

11 Illegal Things You Unknowingly Do on the Internet

After viewing Andriy Slynchuk article and 11 illegal things we do online, I have selected a few that seem the most serious. The five I selected are faking identity online, collecting information about children, recording a VoIP call without consent, illegal searches on the internet and using other people’s internet networks. The reason these five…

SAMPLE BREACH NOTIFICATION

After reading the letter being presented, I’m going to say the letter demonstrated the Laissez-fare economic theory and rational choice. The Laissez-fare by definition means “ version of classical theory that suggests “government should not intervene in the economy except to protect individuals’ inalienable rights”. This is shown in the letters “what are we doing?”…

BUG BOUNTY

To keep things short, the study of Bug bounties has a great ring to it but could possibly use some improvement. Basically individuals are being paid to expose the weaknesses within a companies infrastructure before some who is actually a bad hacker gets into it first. But it has its pluses and negatives. Yes you…

Watch this video. As you watch the video, think about how the Description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

After watching the video, cybersecurity analysts have one of the toughest jobs in the industry. Being in charge of the amount of data stored in computers, hard drives, and the internet is a big deal. They contribute to monitoring and mitigating what a potential can do or have already done. Being an analyst allows for…

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

Name: Omarion BranchDate: 11/5/2022DetailsAfter completing the Social media disorder scale, I scored a 5. I was actually very surprised with even scoring that high honestly. The items on the scale were fairly good questions to ask because you don’t really think much of them. But results could vary depending where you are in the world…

article review 2

The article I will be using for this paper is “The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence”. Within this paper we talk about the evolution of technology and how we have to step our game up as humans in order to keep up with the advancement. As…