For this journal entry, we had to watch a YouTube video and describe what we think about the speaker’s pathway to his career. After watching the video, some of our career paths come in a variety of ways. For the… Continue Reading →
Penetration testers are known as pen testers. Penetration testers are not Vulnerability testers. Even though both occupations look for weaknesses in a security program. A vulnerability tester looks for weaknesses during the design and setup. A penetration tester looks for… Continue Reading →
For this journal entry, we had to read a blog and write a paragraph describing five serious violations and why we think those offenses are serious. The five serious violations I choose were, bullying and trolling, faking your identity online,… Continue Reading →
For this journal entry, we had to read an article and write a summary reaction to the use of the policies. After reading the article, the bug bounty market was a good creation for cyber-security vulnerabilities. Bug Bounty were freelance… Continue Reading →
For this journal entry, we had to read a letter and describe how two different economics theories and two social sciences theories relate to the letter. After reading the letter, I chose Keynesian economic theory and classical economic theory for… Continue Reading →
For this journal entry, we had to watch a video. Then we had to think about how the description of the cyber-security analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. After… Continue Reading →
For this journal entry, we had to an article and summarize it on the topic of social cyber-security. After reading the article, social networks are not giving accurate information. Individuals are making blogs just to get followers and likes. The… Continue Reading →
For this article review, I chose an article from the Journal of Cybersecurity. The title of the article is, “Development of a new ‘human cyber-resilience scale’. In this article, the author explains what happens after an individual has been attacked… Continue Reading →
For this journal entry, we had to complete the social media disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? The… Continue Reading →
For this journal entry, we had to watch a video and pay attention to the way that movies distort hackers. The question that we must answer is “how you think the media influences our understanding about cyber-security?” After watching the… Continue Reading →
© 2026 shanicedolson — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑