Cybersecurity is a vast and ever-expanding field of technology. The more technology becomes an increasing commodity within our lives, the more technological challenges will arise, and the more challenges that arrive, the more will there be a need for cybersecurity experts to mitigate or overcome these challenges. There are many careers that one can go…
Article Analysis
The article titled “Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges,” written by Geraldine Ray, Christopher D. McDermott, and Mathew Nico, is an article previously discussed briefly in the Annotated Bibliography. However, this article deserves a deeper analysis since it covers everything that has been presented so far in class. It is an exhaustive…
Annotated Bibliography
Ray, G., McDermott, C. D., & Nicho, M. (2024). Cyberbullying on social media: Definitions, prevalence, and impact challenges. Journal of Cybersecurity, 10(1). https://doi.org/10.1093/cybsec/tyae026Summary:This article, written by Geraldine Ray, Christopher D McDermott, and Mathew Nico, is an exhaustive study of the problems of cyberbullying and the impact it has on people and society at large. The…
Module 14 Journal Entry
When it comes to Davin Teo’s TED Talk about digital forensics, his story of how he entered the field was interesting, and the details of his career were engaging. Regarding his career path, as mentioned in the video, it was unplanned. He started as an accountant, but he understood how computers work. The day he…
Module 12 Journal Entry
In an article on Clario, written by Andriy Slynchuk, discusses 11 online activities that might be considered illegal. Many of which are things average internet users have done without realizing the risks. In this journal entry, we will examine each activity and evaluate whether these actions are illegal or fall into a legal gray area….
Module 11 Journal Entry 2
In a journal article written by Kiran Sridhar and Ming Ng, they extensively discussed the benefits of hacking and the use of bug bounties. Bug bounties are programs where gig economy security researchers are paid for identifying and explaining vulnerabilities in company codebases (Sridhar and Ng). They operate on a cost-benefit basis, and since firms…
Module 11 Journal Entry 1
Economics and cybersecurity are more closely connected than one might think. Like in any career, economics influences the decisions that businesses and organizations make when managing their operations and employees, but this is especially evident in the field of cybersecurity. Economic theories are developed to illustrate how different economies are managed. The letter provided to…
Module 10 Journal Entry 2
Social Cybersecurity is the title used in the article written by David M. Beskow and Kathleen M. Carley in March 2019. Despite this article being six years old, the content still holds true, if not has become more pertinent, and continues to grow more problematic. To understand why, social cybersecurity must be defined. According to…
Module 10 Journal Entry 1
Nicole Enesse’s video “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook” explains what to expect when choosing this career path. However, when Nicole describes what a cybersecurity analyst does, social themes emerge during her explanation. These themes are social behaviors typically expected in cybersecurity jobs. Here are three of the themes I…
Module 8 Journal Entry
Media influences people significantly. Just one powerful piece of media can inspire someone or completely change their worldview. Media also serves as a way for people to learn new things, understand the world better, or explore specific topics. Cybersecurity is no exception. It has been featured in many shows and movies, which can help viewers…