I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his career was highly informative. Digital forensics as a whole can relate back…
Tag: Journal Entries
The Severity of Potentially Unknown Internet Uses
Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s Internet Networks, and Faking Your Identity Online. The first, bullying and trolling, seems pretty self-explanatory. Any kind of bullying…
Analyzing Bug Bounties
In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met certain criteria. This criterion was that the program started out as private, started no later than May 2019, subscribe to HackerOne program management, and offer cash bounties to hackers….
Data Breaches and Economic Theories
Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle behind the classical theory is self-regulation. This letter shows an example of an effort to retain customers and maintain, or self-regulate, the company’s reputation. Information asymmetry is…
The Cybersecurity Analyst Career
In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have the potential to be responsible for training and cybersecurity awareness for a company. Providing this training requires at least…
The Increasing Need for Social Cybersecurity
The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the flow of information, specifically pertaining to the national level. It points out that the information that is shared and transferred has become both decentralized and removes the need for a…
The Social Media Disorder Scale
I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I think the criteria questions are very thorough and cover different areas of where social media could be interfering with one’s…
Hacking Scenes in Movies Compared to Reality
Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV series and movies and then having an actual professional in the cybersecurity field critique how realistic the scenes are. After viewing the…