Article #2 review
Cybersecurity and cyber policies are extremely important when trying tokeep online information safe and protected. This process would require a lot ofstudying and examining of how people interact and behave online. Cybersecurityrelates to the principles of social sciences because it examines how people’sbehaviors and interactions online impact security...
Read MoreArticle #1 Review
The principles of social science involve studying the human behavior andsociety to understand how people interact and make choices. It can be involved infields such as sociology, psychology, anthropology, economics, and in its ownway, cybersecurity. I say cybersecurity because often, especially when it comes tobattling cybercrimes, analysts must monitor and...
Read MoreWeek 14 – Journal Entry 15
Spcial sciences are forms of the study of human society and social relationships. Digital forensics, alot like social sciences except it analyzes and focuses of the analysis of electronic data rather than human society. When it comes to digital forensics, you can implement alot of different forms of social sciences into it except instead of dealijng with people...
Read MoreWeek 9 – Journal Entry
Upon completing the social media disorder scale, my score did not meet the 5 out of 9 to meet the formal diagnosis of “disordered social media user”. The only questions to which I responded yes was question number 8 “often used social media to escape from negative feelings?” and number 4 “tried to spend less time on social media,...
Read MoreWeek 8 – Journal Entry
After watching the video “Hacker rates 12 Hacking Scenes in Movies and TV | How real is it?” I came to the conclusion that the media influences our understanding for cybersecurity in many ways. For starters it takes the process of hacking and makes it look much easier than what it actually is. In the video Keren goes through these hacking scenes and...
Read MoreCybersecurity Career Professional Paper
When it comes to the field of cybersecurity, there are many different formsof employment that one can go for. For example, one can shoot for Networksecurity, Security engineering, Threat hunting, and many more. While all of thesecareers require and depend on social science research as well as social scienceprinciples, the one that I feel demonstrates all of...
Read MoreWeek 6 – Journal Entry
When it comes to identifying fake websites there are many things that come into play that we should look out for. The first website to look at is TiffanyCoShop.com. The way we can tell this is a fake is because once gaining access to the site, common sense will tell us that the prices listed on this site are unusually low as to be compared to amerchandise sold...
Read MoreWeek 5 – Journal Entry
After reviewing the articles provided in the slideshow, I was able to come to a conclusion and rank each article and its morive from 1 being the most sense to 7 making the least sense. I have organized th articles as follows: For money https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ Revenge...
Read MoreWeek 12 – Journal Entry 14
After reviewing the article titled “11 illegal things you do unknowingly Do on the Internet” I was able to put aside 5 things that stood out to me as the most serious violations. First one would have to be bullying and trolling. Online bullying and trolling also known as cyber bullying, is something that should be prevented at all costs. There are...
Read MoreWeek 10 – Journal Entry 10
Social cybersecurity refers to the combination of cybersecurity and social factors. It concentrates on the understanding of things like human behaviors impact on cybersecurity protocols and practices. The article describes social cybersecurity as an emerging subdomain of national security. It tells us how it cybersecurity takes an influence from the social...
Read More