Article #2 review
Cybersecurity and cyber policies are extremely important when trying tokeep online information safe and protected. This process would require a lot ofstudying and examining of how people interact and behave online. Cybersecurityrelates to the principles of social sciences because it examines how people’sbehaviors and interactions online impact security...
Read MoreArticle #1 Review
The principles of social science involve studying the human behavior andsociety to understand how people interact and make choices. It can be involved infields such as sociology, psychology, anthropology, economics, and in its ownway, cybersecurity. I say cybersecurity because often, especially when it comes tobattling cybercrimes, analysts must monitor and...
Read MoreWeek 14 – Journal Entry 15
Spcial sciences are forms of the study of human society and social relationships. Digital forensics, alot like social sciences except it analyzes and focuses of the analysis of electronic data rather than human society. When it comes to digital forensics, you can implement alot of different forms of social sciences into it except instead of dealijng with people...
Read MoreePortfolio entry 13
When it comes to developing cyber policies and infrastructure with limited predictive knowledge, analysts must be strategic and adaptable to be able to react in any type of situation. There are a few ways that can help approach this scenario. Push continued education: Cyber threats are never the same and the world of technology is evolving more and more as...
Read MoreePortfolio entry #10
Engineers play a crucial role in making cyber networks safer by implementing various measures to protect against cyber threats and vulnerabilities. Engineers work on developing solid security prottocols and forms of encryption to safeguard data transmission and storage. They create secure communication channels and encryption methods that make it difficult for...
Read MoreWeek 9 – Journal Entry
Upon completing the social media disorder scale, my score did not meet the 5 out of 9 to meet the formal diagnosis of “disordered social media user”. The only questions to which I responded yes was question number 8 “often used social media to escape from negative feelings?” and number 4 “tried to spend less time on social media,...
Read MoreWeek 8 – Journal Entry
After watching the video “Hacker rates 12 Hacking Scenes in Movies and TV | How real is it?” I came to the conclusion that the media influences our understanding for cybersecurity in many ways. For starters it takes the process of hacking and makes it look much easier than what it actually is. In the video Keren goes through these hacking scenes and...
Read MoreCybersecurity Career Professional Paper
When it comes to the field of cybersecurity, there are many different formsof employment that one can go for. For example, one can shoot for Networksecurity, Security engineering, Threat hunting, and many more. While all of thesecareers require and depend on social science research as well as social scienceprinciples, the one that I feel demonstrates all of...
Read MoreWeek 6 – Journal Entry
When it comes to identifying fake websites there are many things that come into play that we should look out for. The first website to look at is TiffanyCoShop.com. The way we can tell this is a fake is because once gaining access to the site, common sense will tell us that the prices listed on this site are unusually low as to be compared to amerchandise sold...
Read MoreWeek 5 – Journal Entry
After reviewing the articles provided in the slideshow, I was able to come to a conclusion and rank each article and its morive from 1 being the most sense to 7 making the least sense. I have organized th articles as follows: For money https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ Revenge...
Read MorePowered by WordPress | Designed by Elegant Themes