Davin Teo’s TEDx talk helped me see how digital forensics is not only technical, but deeply rooted in social science thinking. In Module 14, we learned that cyber professionals need to understand concepts like objectivity, parsimony, and determinism, traits also found in social science research. Teo’s career reflects that mindset. He doesn’t just recover data;…
Category: Journal Entries
Journal Entry 14
In the Clario article, five of the most serious online violations include using unofficial streamingservices, torrenting copyrighted material, cyberbullying, recording VoIP calls without consent,and collecting data on children under 13. These offenses are serious because they each violateimportant ethical and legal boundaries. Unofficial streaming and torrenting not only breachcopyright laws but also harm content creators…
Journal Entry 13
The article, “Hacking for good: Leveraging HackerOne data to develop an economicmodel of Bug Bounties,” examines bug bounty programs as a component of cybersecurity policy, focusing on the cost-benefit principles underlying these policies. The literature review highlights the dual rationale for bug bounty policies: addressing the acute shortage of cybersecurity professionals and leveraging diverse, global…
Journal Entry 12
The economic theory of information asymmetry is clearly reflected in the delayed notificationdescribed in the letter. The company and its platform provider were aware of the breach formonths before informing customers, highlighting an imbalance of knowledge. This gap ininformation might have influenced customer behavior during that period, as they continued touse potentially compromised payment methods…
Journal Entry 11
The video on the cybersecurity analyst job highlights several key social themes, particularly theimportance of human behavior in maintaining cybersecurity. One major theme is the role of social engineering, where attackers manipulate individuals into giving up sensitive information, demonstrating that even the most secure systems can be compromised by exploiting human trust. The video also…
Journal Entry 10
The article “Social Cybersecurity: An Emerging Science to Reboot Public Trust in Social Media” by Beskow and Carley explores the growing field of social cybersecurity, which examines how misinformation, influence campaigns, and cyber threats affect public trust in digital spaces. The authors highlight the increasing sophistication of cyber influence operations, particularly those targeting social media…
Journal Entry 9
1. Preoccupation: – Do you frequently find yourself thinking about social media or planning to use it? Yes/No2. Tolerance: – Have you felt dissatisfied because you want to spend more time on social media? Yes/No.3. Withdrawal: – Do you feel restless, irritable, felt bad or upset when you are unable to use social media? Yes/No.4….
Journal Entry 8
After watching Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?, I realized how much the media distorts our understanding of cybersecurity. Movies and TV shows often depict hacking as a fast-paced, glamorous activity, with hackers bypassing security systems in seconds. In reality, hacking is slower, more methodical, and requires…
Journal Entry 6
Fake websites often have characteristics that set them apart from legitimate ones. For example, a fake online store like http://www.lovelybrand.shop may have an unusual URL structure and lack the secure “HTTPS” protocol. Such sites typically offer products at unrealistically low prices and display poor design quality with spelling errors, odd layouts, and pop-ups. Similarly, a…