Week 11 – Journal Entry 13

with No Comments

Bug Bounty is a program that is used by many organizations as an effective means of crowdsourcing security testing and tapping into the global security community. They help companies identify bugs in their code base, that they might have not … Read More

Week 11 – Journal Entry 12

with No Comments

The behavioral economics can be applied to understand how someone might respond to this letter. This letter encourages customers to contact their credit card company. The structure of this letter and its importance can impact customers responses. The Classical economics … Read More

Week 10 – Journal Entry 11

with No Comments

Some social themes that arise in this video are the jobs location, the pay, and needed demands. The location for cybersecurity jobs plays a significant role. This affects the convenience of transportation for work. individual generally find jobs that are … Read More

Week 10 – Journal Entry 10

with No Comments

The article ‘Social Cybersecurity: an Emerging National Security Requirement’ addresses the social dynamics and cybersecurity in the context of national security. The author described how the evolving nature of cyber threats and the necessity of understanding how social factors impact … Read More

Week 9

with No Comments

For the Social media disorder scale, i said no to all the question. maybe in the past i would feel this way, but now a days i don’t really use social media anymore. i think some of the questions asked … Read More

Week 8

with No Comments

The video explained that most films that we watch today overexaggerate the hacking process. For example in one of the movies they explain that the hacker, hacked a registry in less than 2 seconds. In real life this would take … Read More

Week 7

with No Comments

This is related to human system integration because If an online account system is designed with poor usability or lacks clear instructions, users may inadvertently lock themselves out due to user interface issues. This expresses the mixing of humans and … Read More

Week 6

with No Comments

There are many fake websites on the internet that tries to trick users into releasing their important information. For example, The three most popular fake types of websites are banking, online store, and tech support. Fake websites are design to … Read More

Week 4

with No Comments

Maslow’s Hierarchy of Needs is a psychological theory that suggest human needs can be categorized into five levels, these levels are physiological, safety, love and belongingness, esteem, and finally self actualization. For physiological, these are fundamental needs which consist of … Read More

1 2 3