CYSE 201S- Journal Entry #15

Q: Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences.  Write a journal entry describing what you think about the speaker’s pathway to his career. A: Digital forensics, similar to cybersecurity, is a multi-disciplinary field that collects…

CYSE 201S- Journal Entry #14

Q: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. A: From the following 11 illegal things that people on the internet may unknowingly do online, the five that strike me as the five most serious violations are the following: using…

CYSE 201S- Journal Entry #13

Q: A later module addresses cybersecurity policy through a social science framework.  At this point, attention can be drawn to one type of policy, known as bug bounty policies.  These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure…

CYSE 201S- Journal Entry #12

Q: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf  sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.   The following notification document, submitted by the company “Glass Washer Parts”, goes into depth about a security breach within their system where a group of attackers had…

CYSE 201S- Journal Entry #11

Q:Watch this video.  As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. A: According to the video, a cybersecurity analyst is the “first line of defense” against any sort of cybersecurity attack that…

CYSE 201S- Journal Entry #10

Q: Read this and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ A: The following article discusses the definitions behind the term “social cybersecurity” and the implications of needing to introduce this field of study within the growing information wars. Essentially, focuses on this idea of “using technology to…

CYSE 201S- Journal Entry #9

Q: Complete the Social Media Disorder scale.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world? A: According to the Social Media Disorder Scale, I scored a 3.0, which indicates that I do not have the formal diagnosis…

CYSE 201S- Journal Entry #8

Q: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. A: Throughout the video, there were several movies that ended up having a very faithful and accurate protrayal of hacking, cyberattacks, and cybersecurity in general, offering an entertaining and enlightening portrayel of how cybersecurity specialists…

 CYSE 201S- Journal Entry #7

Q: Explain how your memes relate to Human Systems Integration. A: The following meme was created to showcase why Human Systems Integration is an important consideration when designing a secure cybersecurity system. In a more public setting, it’s very easy for a person to have their personal information or data stolen by connecting to a…

CYSE 201S- Journal Entry #6

Q: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? A: For this first website, this showcases a fake logon page for the website PayPal. While not appearing like a fake webpage at first, if you look at the search…

CYSE 201S- Journal entry #5

Q: Review the articles linked with each individual motive.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. Answer: According to the 7 motives of individual motive, here…

CYSE 201S- Journal entry #4

Q: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.  Give specific examples of how your digital experiences relate to each level of need.  A: According to Maslow’s Hierarchy of needs, every person has needs that must be fulfilled at the bottom of the model first before meeting…

CYSE 201S- Journal Entry #3

Q: Visit PrivacyRights.org to see the types of publicly available information about data breaches.  How might researchers use this information to study breaches?  Enter a paragraph in your journal. A: From reading both the data collected from the database and the FAQ section of the website, I’ve come to a few conclusions regarding how researchers…