A cyber analyst is a job that is responsible for monitoring and responding to alerts that are triggered by security controls. They work across teams with the security analysts to perform incident investigations and give responses to any suspicious activities or vulnerabilities, and report these incidents to push for better policy or patch updates. A…
Category: Journals
Journal 10
Based on the article, warfare has fundamentally changed. Social sciences have changed the way we interact with the world and specifically the way we handle cybersecurity. The effects of this can be changes made to global markets beliefs and ideas. Strength is now decided by information, and the more you have the better. There are…
Journal 8
One major thing I have noticed and this video had somewhat highlighted is how in media we show these hackers and agents having almost superpowers. In the real world if someone is hacking or doing intelligence they are just normal people who either have the skills or do it for work. We tend to think…
Journal 6
Fake or malicious links are commonplace to scam people out of data or sensitiveinformation like your credit cards or your social security number. Oftentimes, fake links aredisguised to look like real websites with only a small difference in its domain name. So, wheredo we run into fake links? Normally when searching on search engines like…
Journal 9
Based on the Social Media Disorder Scale I would have scored a 0 as none of the questions I could say were true to me. I think the items in the scale were alright, but it lacked a lot of important details. ForĀ example, regularly neglecting other activities to spend time on social media is…
Journal 13
Bug bounty policy creates a supply and demand for people who have the skills necessary to find ways to breach security. The policy is low risk to the company since if no vulnerabilities are found then you do not have to pay out. On the likely chance that someone does find something, you can patch…
Journal 14
The five most illegal things that people do on the internet without usually knowing they are committing an illegal act are sharing addresses or photos of others, using other peoples internet networks, bullying and trolling, using unofficial streaming services, and faking your identity. The first one, sharing addresses or photos of others might not seem…
Journal 12
Classical economic theory would state that a person who would steal information, like your credit or debit card numbers, or name, phone number and address would be incentivised to do so because it creates a buyers market. With the stolen information, there would then drive up the demand to buy the information for all sorts…
Journal 15
Digital forensics relates to social sciences because it’s the analysis and reporting of various types of electronic data that can be presented in a court of law. The tool gets metadata, or data about data, to preserve the data and to do an investigation. Davins story about how he got into digital forensics is interesting….