After reviewing the presentation by Davin Teo, I found some distinct similarities between social science and digital forensics. One of the largest comparisons that can be found in understanding human behavior. Victim precipitation and user behavior are two domains in particular that digital forensics teams use in their line of work. Understanding mistakes in a…
Author: rtimm004
Journal Post 14# November 13th, 2023
Andriy Slynchuk’s blog post “11 Illegal Things You Unknowingly Do on the Internet” was an eye-opening exercise, displaying that simple, benign things done daily by internet goes are actually illegal. There are five in particular that are more serious than the rest. Firstly, the collection of information on children. COPA protects children explicitly from this,…
Journal Post 13# November 8th 2023
“Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties”, by Kiran Sridhar and Ming Ng, is a comprehensive study of the effectiveness and benefits of bug bounty programs. As described in the article, a bug bounty program is the process by which companies open up their code bases, and allow…
Journal Entry 12# November 6th, 2023
The sample breach notification letter from Glasswasherparts displays a company’s best efforts in informing its customers of a malicious attack that occurred on their systems. (Not exactly THEIR systems, but the systems they pay for) There are two economic and social theories that can be tied to the letter to best explain it, as well…
Journal Post 11#, November 2nd
When listening to Nicole Enesse’s description of a cybersecurity analyst, there were a few social behaviors that could be tied to the requirements of the job. One of the most important was ‘continued learning’. I’ve heard this adage used before, but in different words. My dad always instilled in me “being a lifelong learner”. Meaning,…
Journal Post 10# October 30th
Cyber security in the traditional sense has always been described as primarily technical in nature. This course has discussed how this is not the case, with human behaviors and social aspects having an outsized role in cyber security effectiveness. One article in particular that reinforces this fact comes from the Army University Press, titled “Social…
Journal Post #9 October 23rd, 2023
Prompt: Complete the Social Media Disorder scale. How did you score? What do you think about the items on the scale? Why do you think that different patterns are found across the world? TEST During the past year, have you …• Regularly found that you can’t think of anything else but the moment that you…
Journal 8# October 16th, 2023
When starting in Cybersecurity, one of my first professors, Professor Boyle, told me and the class that the material we were covering was very dull and dry. (For context, we were taking ITN 101 at Tidewater Community College, which used the CompTIA Network+ textbook.) To combat the onslaught that was the in-depth description of wiring…
Journal Entry #7 October 10th, 2023
Prompt: Review the following photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s mind. Explain how your meme relates to Human Systems Integration. I describe myself as an enjoyer of memetic videos and images. Despite this, I lack the creativity to create potent memes. Below…
Journal Post 6# October 3rd
Prompt: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? During the early stages of the internet, it was extremely difficult to authenticate the legitimacy of websites. Though methods have been implemented to curb malicious links, they still persist. Below…