Introduction Penetration Testers (pen testers) are one of the most important jobs within the field of cybersecurity. They carry out simulations and tests of cyberattacks to identify vulnerabilities and evaluate the effectiveness of security systems (What is a penetration tester: Skills and career paths, 2023). By utilizing social science principles, penetration testers gain the…
Author: tmorg022
Journal 15
Instructions: Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTube. Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo’s professional journey into digital forensics was never linear. He started out…
Journal 14
Instructions: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The author, Andriy Slynchuk, describes how often people commit illegal acts online without knowing. There are five acts that…
Journal 13
Instructions: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure…
Journal 12
Instructions: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. The “SAMPLE DATA BREACH NOTIFICATION” relates to two economic theories, the first one being laissez-fare economic theory. This was shown in how law enforcement responded…
Journal 11
Instructions: Watch this video Links to an external site.. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site., think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. The video presentation on cybersecurity analysts features various social themes like networking,…
Journal 10
Instructions: Read this and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site. The article, “Social Cybersecurity An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD, emphasizes the growing need to address the social side of cybersecurity. The authors…
Journal 9
Instructions: Watch this Video: Social media and cybersecurity Links to an external site. Complete the Social Media Disorder scale Download Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? The score I got after doing the Social Media Disorder…
Journal 8
Instructions: Watch this video and pay attention to the way that movies distort hackers.Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity The media tends…
Journal 7
Instructions: Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). A. Family and Cybersecurity How my grandma sees me after I fixed her phone with a pop-up virus: This meme falls under the Families and Cybersecurity section in the…