Career Paper & Article Reviews

with No Comments

Career Paper                         In the evolving field of cybersecurity, the role of government agencies is critical in safeguarding national security, infrastructure, and sensitive information. Government cybersecurity agencies are responsible for the digital defense against sophisticated threats. Government cybersecurity professionals … Read More

Week 12 – Journal Entry 14

with No Comments

 write a paragraph describing the five most serious violations and why you think those offenses are serious. The first serious crimes from the list i see would be “Bullying and Trolling”. Online bullying tend to cause severe emotional distress and … Read More

Week 11 – Journal Entry 13

with No Comments

Bug Bounty is a program that is used by many organizations as an effective means of crowdsourcing security testing and tapping into the global security community. They help companies identify bugs in their code base, that they might have not … Read More

Week 11 – Journal Entry 12

with No Comments

The behavioral economics can be applied to understand how someone might respond to this letter. This letter encourages customers to contact their credit card company. The structure of this letter and its importance can impact customers responses. The Classical economics … Read More

Week 10 – Journal Entry 11

with No Comments

Some social themes that arise in this video are the jobs location, the pay, and needed demands. The location for cybersecurity jobs plays a significant role. This affects the convenience of transportation for work. individual generally find jobs that are … Read More

Week 10 – Journal Entry 10

with No Comments

The article ‘Social Cybersecurity: an Emerging National Security Requirement’ addresses the social dynamics and cybersecurity in the context of national security. The author described how the evolving nature of cyber threats and the necessity of understanding how social factors impact … Read More

Week 9

with No Comments

For the Social media disorder scale, i said no to all the question. maybe in the past i would feel this way, but now a days i don’t really use social media anymore. i think some of the questions asked … Read More

Week 8

with No Comments

The video explained that most films that we watch today overexaggerate the hacking process. For example in one of the movies they explain that the hacker, hacked a registry in less than 2 seconds. In real life this would take … Read More

Week 7

with No Comments

This is related to human system integration because If an online account system is designed with poor usability or lacks clear instructions, users may inadvertently lock themselves out due to user interface issues. This expresses the mixing of humans and … Read More

1 2