Cybersecurity and Social Science

ePortfolio page for CYSE 201S


  • Journal Entry 15

    Digital forensics with the social sciences Watch this video and think about how the career of digital forensics investigators relates to the social sciences. In the Journal Entry, describe what you think about the speaker’s pathway to his career. I think that his career path was a pretty frequent path to being in digital forensics……


  • Journal Entry 14

    Andriy Slynchuk has described eleven things Internet users do that May be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious https://clario.co/blog/illegal-things-you-do-online/ Sharing Passwords, addresses, or photos of others: Sharing this data can lead to all kinds of trouble for……


  • Journal Entry 13

    A later module address cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals. For identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try exploring the cyberinfrastructure using their……


  • Journal Entry 12

    Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Classic Economic Theory: this theory emphasizes the importance of free markets and individual economic decisions in driving economic growth. With this data break, this theory would suggest that companies should be free……


  • Journal Entry 11

    watch the video. Think about how the description of the cybersecurity analyst job relates to social behaviors. White a paragraph describing social themes that arise in the presentation. The job description of a cybersecurity analyst typically involves tasks such as identifying and mitigating cyber threats, analyzing data breaches, and implementing security protocols to protect an……


  • Journal Entry 10

    Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ The main point of the article is that war is changing from violence and physical things to cyberspace and sharing hidden or incorrect information. With the widespread use of technology and the internet, there is no need to……


  • Journal Entry 9

    Complete the social media disorder scale. How did you score? What do you think about the items on the scale? Why do you think that different patterns are found across the world? During the past year, have you …• regularly found that you can’t think of anything else but the moment that you will be……


  • Journal Entry 8

    After watching the video, how do you think the media influences our understanding about cybersecurity Overall in the media, hacking, and cybersecurity is shown with a mix of reality and science fiction. When it shows real techniques used, the process of it is done way faster than in reality. The media also adds extra fluff……


  • Journal Entry 7

    Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your meme relates to Human Systems Integration. https://unsplash.com/photos/mfB1B1s4sMc https://unsplash.com/photos/gySMaocSdqs https://unsplash.com/photos/ICTKcvnXx_8 https://unsplash.com/photos/Z3ownETsdNQ https://unsplash.com/photos/5QgIuuBxKwM https://unsplash.com/photos/R6dSBkz32B8 https://unsplash.com/photos/BXiLSwwvqrY https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg People are on the internet all day every day from……


  • Journal Entry 6

    Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?


  • Journal Entry 5

    Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way your rank it.


  • Journal Entry 4

    Review Maslow’s hierarchy of Needs and explain how each level relates to our digital experiences relate to each level of need. For our basic needs, technology can come into play with security. All of our information is kept on technology and if that gets exposed, we are vulnerable. So, our need for cybersecurity starts at……


  • Journal Entry 3

    Visit privacyrights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Researchers can use this information to look at what information is being targeted and how. We know that we must decide what data need more protection than the rest, but with the data……


  • Journal Entry 2

    Explain how the principles of science relate to cybersecurity: Relativism: Every new development is made; new hacks can be made. Each updated system can possibly have new holes for hackers to find. This is a never-ending cycle of closings and openings to be found Objectivity: How can we as individuals decide what to do about……


  • Journal Entry 1

    Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to your and which would appeal the least. When looking at the NICE Framework for Cybersecurity, the category of investigation is the most interesting to me. I have always been……