Journal Entry #15

I think that the speaker’s pathway to his career is a very realistic description of how many people in the field of cybersecurity find their careers. He started in a help desk job, then moved to a new job at a bigger company. After this, he got a new job in digital forensics at a…

Journal Entry #11

Being a cybersecurity analyst relates to social behaviors. One of the ways that it relates to social behaviors is that cybersecurity analysts will often be responsible for training people. This training includes things like how to look out for phishing attacks or how to take steps to avoid having your information compromised by looking out…

Journal Entry #14

            People do many things online to break the law, and sometimes they might not even know it. The worst things that people do are use fake identities, look up illegal things, record calls without consent, bullying, and sharing personal information. Using a fake identity is the worst offense out of these because identity fraud…

Journal Entry #13

Relevant Study: https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true This study focuses on data from HackerOne’s bug bounty program. The study found that mostpeople who participate in this program or other bug bounty programs are largely unmotivatedby the money that they can earn from finding bugs. Also, bug bounty programs are still usefulto companies even if they aren’t able to pay…

Journal Entry #8

I think that most media influences our understanding about cybersecurity by showing us unrealistic depictions of what hackers are and what they do. Some shows or movies can make hacking seem more complicated than it is, simpler than it is, or just completely make things up about it. Some media shows hacking as typing a…

Journal Entry #9

I scored a 3 out of nine on the Social Media Disorder Scale test. I think that some of the items on the scale are less serious than others, but when multiple of them are combined they can have negative effects on people’s lives. The worst items on the list are neglecting other responsibilities because…