Journal 15
When it came to watching the video on digital forensics investigators have a challenging job that requires them to solve puzzles that fit snugly with social sciences. While their primary responsibility is to investigate digital clues to catch cyber criminals, their discoveries have far-reaching consequences in our social world. To get to the root of cyber crimes, these investigators must deeply understand what motivates people – their behaviors, thoughts, and the overall role of society. It’s crucial to realize that cyber crimes don’t just affect technology; they devastate...
Read MoreJournal 14
In my opinion out of the eleven choices given it contained five severe violations that breach legal boundaries and potentially endanger individuals, compromising their privacy and security. Firstly, sharing personal data, such as passwords, addresses, or photos of others without consent, constitutes a severe breach of privacy. Secondly, using unofficial streaming services to access copyrighted material without authorization undermines content creators’ rights and exposes users to legal liabilities. Thirdly, recording calls without consent violates individuals’ privacy rights and...
Read MoreJournal 13
In this journal article, it will delve deeper into the article given and show the role played by VDPs and Bug Bounty Programs in improving cybersecurity. Despite some controversy at their introduction, both initiatives have seen a significant uptake in recent years due to their success in uncovering previously unknown cybersecurity vulnerabilities. The empirical contribution consists of analyzing the determinants of the effectiveness of Bug Bounty Programs, using inquiry-driven econometric methods such as robust regression models and instrumental variable strategies to establish causality...
Read MoreJournal 12
Market Failure theory is a framework that examines situations where markets cannot allocate resources efficiently. Data breaches can be seen as a form of market failure. The failure to adequately secure customer data can lead to negative externalities such as potential identity theft or fraud. This means that customers may incur costs due to the breach not accounted for in the market transactions. Cost-benefit analysis is a theory that customers apply when purchasing online platforms. A data breach introduces new costs that customers did not initially consider. This theory highlights how...
Read MoreJournal 10
When it comes to social cybersecurity, is a critical aspect of modern warfare, as it focuses on understanding how human behavior intersects with technology. It involves manipulating human behavior through technology to achieve strategic goals, this manipulation then affects the protection of information systems. An example of this is the Russian propaganda machine as it serves as a notable example of leveraging information warfare tactics to weaken nations. Another thing is about bots which are powered by artificial intelligence. Bots play a significant role in these operations by spreading...
Read MoreJournal 11
With this journal it goes into a video that reviews information into what acyber security analyst is. Analysts branch off into many different thingsbecause they are the first responders to any cyber related incident. When itcomes to social attacks on the network, they will be the first to deal with it.Some of the social attacks mentioned are ones I have brought up earlier and it’scalled Phishing. Phishing is a main attack that needs to be responded toquickly and it occurs in mostly emails. Another thing about analyst jobs is you need to be updated with all thenewest cyber security trends and...
Read MoreJournal 9
I read Tobi-Goldfus-Social-Media-Disorder-Scale and watched the videocorrelated with it. Now going through it I scored 2 out of 9, only because Ilook at social media when I’m upset or bored and to help clear the mind. I knowthere are times where there is work and play, and taking pictures of obviouslydata sensitive things is bad. There are places in companies that allow you totake phone calls or breaks such as break rooms, bathrooms, outside areas, andprivate meeting rooms. Wait till you’re able to enter these places before you startgiving out data that may or may not be sensitive. The...
Read MoreJournal 8
When it comes to social media and it’s impact on us as humans when it comes to cyber security its actually quite prominente. Media is everywhere no matter if you are trying to avoid it or not, its all around us while were driving, in stores, or even going into nature. The main form of media that was talked about in the video we were presented to watch, focused on movies with scenes that focused on hackers or cyber security related things. More people watch movies and shows over actually looking up how to help when you are attacked by a virus or hacker. This of course makes people...
Read MoreJournal 7
In this journal I made 3 memes that I believe I could centralize the most around human center cyber security. Meme #1 This goes with Human Based security as one thing humans do security wise is sift through the spam mail then trash what’s unneeded. Doing this often can keep you from unnecessary phishing that’s found in emails. Meme #2 Social media is a big thing when it comes to human security, since social media is free to everyone with little to know filter to stop people from stealing your personal info. It’s your job condese time spent on social media to better protect...
Read MoreJournal 6
Victoria Sanderson2/14/2024 For this Journal it revolves around how to tell between fake vs real sites while surfing the web. Of course while you may be looking for a certain site on the web you come across a look a like that’s not actually the real thing. I remember as a kid looking for mods to mod my games and you can come across a site that looks slightly different then what you are used too. There are several misspellings, the name is wrong, even the URL is red where the log should be. Fake sites: Zorasoul.com – fake clothes site, used to steal credit card information...
Read More