Journal Entry 15

Digital forensics with the social sciences Watch this video and think about how the career of digital forensics investigators relates to the social sciences. In the Journal Entry, describe what you think about the speaker’s pathway to his career. I think that his career path was a pretty frequent path to being in digital forensics…

Journal Entry 14

Andriy Slynchuk has described eleven things Internet users do that May be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious https://clario.co/blog/illegal-things-you-do-online/ Sharing Passwords, addresses, or photos of others: Sharing this data can lead to all kinds of trouble for…

Journal Entry 13

A later module address cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals. For identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try exploring the cyberinfrastructure using their…

Journal Entry 12

Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Classic Economic Theory: this theory emphasizes the importance of free markets and individual economic decisions in driving economic growth. With this data break, this theory would suggest that companies should be free…

Journal Entry 11

watch the video. Think about how the description of the cybersecurity analyst job relates to social behaviors. White a paragraph describing social themes that arise in the presentation. The job description of a cybersecurity analyst typically involves tasks such as identifying and mitigating cyber threats, analyzing data breaches, and implementing security protocols to protect an…

Journal Entry 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The main point of the article is that war is changing from violence and physical things to cyberspace and sharing hidden or incorrect information. With the widespread use of technology and the internet, there is no need to…