CYSE 201S Journal 14
Davin Tao relates how when he first entered the field there was no classes or usual method of entry but actually credited his father. Starting as an accountant its clear from the start he is a very analytical individual. I think its excellent how Davin leap on opportunity and did the split role of accounting…
CYSE 201S Journal 13
Sharing personal information like passwords or addresses is one of the most serious offences because it could have some of the most serious consequences to the victim. Collecting information about children is just as serious as why that is happening is always concerning and the very action should be taken seriously with the perpetrator charged…
CYSE 201S Journal 12
This article goes into detail to a current solution to there being a massive lack of cybersecurity professionals within the workforce. Current estimates are that the industry lacks around 4 million different jobs in the field with major companies snapping up and retaining the talent which is there in the field. Putting out Bug Bounties…
CYSE 201S Journal 10
The article introduces the field of social cybersecurity and how it fits into the world around us. Social cybersecurity is defined as the study of human behavior and social interaction regarding cybercrime and the cybersecurity methods formed in its wake. On a large-scale example of things such as information warfare between near peer countries and…
CYSE 201S Journal 9
On the Social Media Disorder Scale I surprisingly scored fairly low on the disorder use. Given how I grew up with the development of social media and its rise within common culture i thought I would have more disordered behavior surrounding its use but what has actually occurred is over the years I have begun…
CYSE 201S Journal 8
As highlighted by the extremely accomplished Keren Elazari there tends to be a wide gap in how cybersecurity is represented in media and actual operational security. The directors and those behind the media often times have literally no concern for the proper method to show cybersecurity in their film. There is typically even completely made-up…