Journal Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo begins the speech with describing the generalized idea of people who…

Journal Entry #13

A later module addresses cybersecurity policy through a social science framework.  At this point, attention can be drawn to one type of policy, known as bug bounty policies.  These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing…

Journal Entry #11

Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. Cybersecurity Analysts are the first line of defense and they usually monitor over networks. They sometimes identify flaws within the system….

Journal Entry #14

Andriy Slynchuk has described eleven things Internet users do that may be illegal.  Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. In Andriy Slynchuk’s blog “11 Illegal Things You Unknowingly Do on the Internet” the topic of common things that people do on…

Journal Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf  sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.   The sample letter essentially is informing all prior customers that have given financial data, that their data may have been compromised. It gives a few sections where it informs the consumer: what…

Journal Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD discusses the importance of social cybersecurity and the change that is has caused within warfare tactics. As stated…

Journal Entry #9

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? During the past year, have you … I scored 1/9 which is considered to be a norm for this scale. Anything between 2-5…

Journal Entry #8

Watch this video and pay attention to the way that movies distort hackers: “Hacker Rates 12 Hacking Scenes In Movies and TV | How Real Is It? – YouTube”. Write a Journal Entry about how you think the media influences our understanding about cybersecurity. The media influences a lot of the general public’s view of…

Journal Entry #6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Three simple examples of fake websites are: Three examples of real websites are: The first thing to examine when trying to tell if a site is legitimate is the domain name….

Journal Entry #7

Create a meme with one of the images given in the slides and explain how your meme relates to Human Systems Integration. Most organizations fail to center the issues presented with cybersecurity around the human factors. Organizations would benefit greatly if they have a human factors program where they partner with psychology-based professionals, cognitive scientists,…