Journal Entry #15: Digital Forensics | Davin Teo | https://www.youtube.com/watch?v=Pf-JnQfAEew Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

After watching the TED talk video of Davin Teo sharing his insight on the Digital Forensic career field and his journey into it, I was enthusiastic because I am highly interested in this career. Digital forensic investigators are skilled in electronic devices, collecting and analyzing data, and using digital evidence tools to help them solve…

Journal Entry #14: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Andriy Slynchuk’s article “11 illegal things you unknowingly do on the Internet” highlights illegal things that people do on the Internet that are common. The five that I think are the most serious are collecting information about children, faking your identity online, sharing passwords, addresses, or photos of others, bullying and trolling, and using unofficial…

Journal Entry #13: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The letter provides customers with information about a data breach that took customer information like their address, phone number, and credit and debit card information. The letter can relate to economic and social science theories impacting businesses and customers. Two economic theories are Marxian and rational choice theory. Marxian economic theory is that those with…

Journal Entry #12: Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies. Focus primarily on the literature review and the discussion of the findings.

The article “Hacking for Good: Leveraging Hacker One Data to Develop an Economic Model of Bug Bounties” by Kiran Sridhar and Ming Ng provides exciting insights into the economic principles and benefits of bug bounty policies. Bug bounty policies pay individuals to identify vulnerabilities in a company’s cyber infrastructure by allowing ethical hackers to conduct…

Journal Entry #11: As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

In the video, “What does a Cybersecurity Analyst Do? Salaries, Skills, & Job Outlook,” Nicole Enesse does a great job giving an overview of Cybersecurity positions, where they are located, skills, salaries, and much more. Based on these job descriptions, understanding social behaviors would be highly beneficial when working in this field. Some social behaviors…

Journal Entry #10: Review the article “Social Cybersecurity An Emerging National Security Requirement” by Lt. Col David M. Beskow and Kathleen M. Carley and write a journal entry summarizing a response to the article on social cybersecurity

The article “Social Cybersecurity: An Emerging National Security Requirement” highlights the importance of social cybersecurity and how the digital world has evolved into platforms where anyone can spread disinformation that significantly influences national security. My response to the article is that people must conduct their own fact-checking because most information is now distributed at the…

Journal Entry #9: How did you score on the Social Media Disorder scale? What do you think about the items on the scale? Why do you think that different patterns are found across the world?

The Social Media Disorder Scale is supposed to measure a person’s addiction level or problematic use of social media. The scale includes items to assess different aspects of social media use, like it’s all-consuming and you can’t think of anything else, getting into arguments about usage, or lying about how much time you spend on…

Journal Entry #8: Watch this video. Hacker Rates 12 Hacking Scenes In Movies and TV | How Real Is It? After watching the video, what do you think about how the media influences our understanding about cybersecurity?

After watching the YouTube video “Hacker Rates 12 Hacking Scenes in Movies and TV | How Real Is It?” the media’s portrayal is often misleading and inaccurate. The video highlights scenes in movies and TV shows of hackers being over dramatic and skews away from real-world hacking. However, some movies and TV shows discussed were…

Journal Entry #1: Review the NICE Workforce Framework. Are there specific areas on which you would want to focus your career (investigate, operate and maintain, and analyze)? Explain which areas would appeal the most to you and which would appeal the least.

The Workforce Framework for Cybersecurity, also known as NICE Framework, is a resource that was developed by the National Institute of Standards and Technology (NIST) to help employers find, make, and retain skilled cybersecurity professionals. The framework comprises seven categories, thirty-three specialty areas, and fifty-two work roles. The categories that appeal the most to me…

Journal Entry #7: Create a Meme For Each of The Ten Photos Explaining What is Going on in The Individuals Mind(s) Through a Cybersecurity Human Systems Integration Framework.

All of these memes demonstrate the need to approach cybersecurity in a comprehensive way that is both technical and human factors. This meme of a person scrolling through social media reviewed in the Human Systems Integration framework context exhibits the idea that social media uses algorithms designed to tailor your experience based on your behavior…