Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. As an accountant by profession, he figured out a way to move from accounting to it/cybersecurity. He did not know much of…
Journal Entry 14
Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The five most serious ones are accessing someone else’s…
Journal Entry 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…
Journal Entry 12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Economic theories, there are game theories which is applied in cybersecurity to model the interactions between attackers and defenders. In the context of a data breach…
Journal Entry 11
Watch this videoLinks to an external site.. As you watch the video Cybersecurity is often associated with technical skills, and knowledges of systems and networks, whilst the job of a cybersecurity analyst involves understanding and analyzing social behaviors to effectively protect against cyber threats. Now one may ask, how does that relate to social behaviors? Well,…
Journal Entry 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. Note: Submit the file [in Word, text or pdf format] or Upload your journal entry into your ePortfolio and submit the link in the assignment Summary – This article provided insightful and a profound…
Journal Entry 8
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. Media gears the understanding of cybersecurity through agenda setting as it often dictates what cybersecurity issues are highlighted and discuses in the public sphere. The medias choice of topics and stories does that. There is framing…
Career Paper
Samael Pamie-GeorgeProfessorCareer Paper4/11/2024 Infosec Analyst/Cybersecurity AnalystVigilant, analytical, and adaptive are just three words to describe the job of an Infosecanalyst and a cybersecurity analyst. The role of a security analyst is broad. It consists ofnumerous responsibilities, like monitoring security best practices, procedures with the right tools,protocols and making sure that all practices are properly used…
Article Review 2
Samael Pamie-GeorgeProfessorArticle Review #23/23/2024 Cyber ProtectionIntroductionWhat is cyber protection? According to Acronis Cyber Protection Cloud, cyber protectionis the integration of cybersecurity and data protection, which resides as a necessity for safebusiness in the cyber threat landscape (acronis). The article being reviewed/analyzed is theAdministrative Obligations for Diplomatic Missions in the Context of International and NationalLaw: Implications…