Davin Teo’s path to becoming a digital forensics is very interesting. He started his career in accounting. As his interest and proficiency in IT grew it led him to specialize in digital forensics. Davin Teo is very passionate about solving intricate puzzles and uncovering digital evidence. This is very evident from his detailed case studies. His shift from old-fashioned data-gathering methods to the latest technological advancements shows how...
From Andriy Slynchuk’s eleven points. I feel that there are five that are that are the most serious violations. The first serious violation is using unlicensed streaming services. This involves accessing copyrighted content without authorization, which supports piracy and causes financial losses for creators. The second serious violation is revealing someone else’s details like passwords or addresses without their permission. This invades...
The bug bounty policy discussed in the literature review shows it’s a good way to boost cybersecurity. The research points out that hackers are driven by more than money they also value experience, reputation, and the desire to help others. I believe encouraging ethical hacking helps find weaknesses and builds a group of experts committed to bettering cyber defenses. Bug bounty programs adjust well for both novice and experienced hackers,...
After reading “SAMPLE DATA BREACH NOTIFICATION” I found two different economics theories and two different social sciences theories that relate to the letter. From an economic standpoint, the data breach notification letter relates to both information asymmetry and cost-benefit analysis theories. Information asymmetry theory is seen in how the company reacts, upon discovering the breach, and has chosen to notify customers about potential risks...
The video I watched today delved into the role of a cybersecurity analyst. Nicole Enesse talked about the key aspects of a cybersecurity analyst as the title, responsibilities, salaries, and job outlook of a cybersecurity analyst. The most significant social theme discussed in the video involves the changing nature of work and career paths in our digital age. Nicole Enesse talked about how job titles vary from company to company reflecting how...
The central theme of the article was centered around the evolving world of social cybersecurity. The article explored how cybersecurity plays a critical role in our modern warfare and national security. It sheds light on how technology has transformed information warfare into a powerful tool for manipulating nations, shaping our narratives, and influencing our geopolitical outcomes. The article also delved into a discussion on Russia’s...
After completing the social media disorder scale, I scored 0 / all no’s. According to the tests I have had no signs of addiction to social media during the past year. I liked the questions in the test because they spoke directly to this era of young people. Asking questions like “During the past year have you regularly found that you can’t think of anything else but the moment you will be able to use social media again?”. Different patterns...
After watching the video on how movies distort hackers it is very clear how the media influences our interpretation of the cybersecurity realm. Malcolm X once said, “The media’s the most powerful entity on earth. They have the power to make the innocent guilty and to make the guilty innocent, and that’s power. Because they control the minds of the masses”. In the same way in our world today the media plays a prominent role in our perception of...
For this journal entry, I have been tasked with finding three fake websites and comparing them with three real websites. After looking at the three fake websites, I have noticed that they all share a common theme of unsecure URLs, poor design, and no contact information. In contrast after looking at the three real websites, I have noticed that they all shared a common theme of a secure URL, nice design, and clear and reachable contact. By...