CYSE 201S Journal 13: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

Digital forensics investigators collect, analyze, and report data to be used in a court of law. Digital forensics relates to criminology because investigators and cybersecurity experts can use digital information to solve crimes, or to understand why criminals commit crime. Continue reading CYSE 201S Journal 13: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

CYSE 201S Journal 12: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious

I think that the five most serious online violations (in no particular order) are bullying, faking your identity online, illegal searches on the internet, sharing passwords/addresses/photos of others, and collecting information about children. To start, online bullying, or cyberbullying, is Continue reading CYSE 201S Journal 12: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious

CYSE 201s Journal 11b: Read this article and write a summary reaction to the use of policies in your journal. Focus primarily on the literature review and the discussion of the findings.

This is a great article that dives into bug bounty programs, exploring their impact on cybersecurity and shedding light on factors that influence the number of valid vulnerability reports received by these programs. It begins by dissecting the literature concerning Continue reading CYSE 201s Journal 11b: Read this article and write a summary reaction to the use of policies in your journal. Focus primarily on the literature review and the discussion of the findings.

CYSE 201s Journal 11a: Read this sample breach letter and describe how two different economic theories and two different social science theories relate to the letter

The sample data breach letter is somewhat similar to the classic economic theory. Classic economic theory suggests that markets are generally efficient and self-regulating. The security breach, as explained in the letter, can be seen as a disruption to the Continue reading CYSE 201s Journal 11a: Read this sample breach letter and describe how two different economic theories and two different social science theories relate to the letter

CYSE 201S Journal 10b: Write a paragraph describing social themes that arise in the presentation

After watching the video, I thought of several social themes that are related to her video about cybersecurity analysts. First, she mentions at the beginning of the video, in the segment “What is a Cybersecurity Analyst”, that cybersecurity analysts (CA’s) Continue reading CYSE 201S Journal 10b: Write a paragraph describing social themes that arise in the presentation

CYSE 201S Journal 10a: Read this and write a journal entry summarizing your response to the article on social cybersecurity

The article “Social Cybersecurity: An Emerging National Security Requirement” is a great article that explores the field of social cybersecurity, emphasizing its critical role in contemporary warfare dominated by information and psychological tactics. It focuses on the decentralized nature of Continue reading CYSE 201S Journal 10a: Read this and write a journal entry summarizing your response to the article on social cybersecurity

CYSE 201S Journal 8: After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity

I think that the media has influenced our understanding of cybersecurity in a few ways. The media has given cybersecurity/hacking this aesthetic to make it more visually appealing. In the beginning of the video, specifically when they’re looking at the Continue reading CYSE 201S Journal 8: After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity