Category: Uncategorized
Week 15 – Journal Entry 15
After watching Davin Teo’s TedTalk, digital forensics investigators are able to integrate psychology and sociology to analyze digital evidence in criminal or cyber cases, ensuring ethical guidelines like privacy and consent are followed. Legal compliance, informed by criminology, governs evidence …
Week 13 – Journal Entry 14
After reviewing Andriy Slynchuk’s blog on 11 illegal things we unknowingly do online, the five violations I find the most serious are using unofficial streaming services, sharing passwords, addresses, and photos of others, recording a VoIP call without consent, faking …
Week 12 – Journal Entry 13
After reading Kiran Sridhar’s article about an economic model for bug bounties it asks the question if bug bounties improve the cybersecurity of all organizations and do HackerOne hackers help firms find the vulnerabilities that their internal technical teams missed? Looking …
Week 12 – Journal Entry 12
After reading Glasswasherparts data breach letter, two economic theories that can be identified are laissez-fare and rational choice. Laissez-fare suggests that government should not intervene in the economy except to protect individuals’ inalienable rights. In the letter it mentions how …
Week 11 – Journal Entry 11
After watching the video from Nicole Enesse explaining what a cybersecurity analyst does there’s many things mentioned in her description that aligns to social behaviors. Majority of what she said was a matter of being proactive when it comes to …
Week 11 – Journal Entry 10
After reading the article Social Cybersecurity An Emerging National Security Requirement, it is pivotal to understand the importance of social cybersecurity and how it will affect all levels of future warfare. Being able to forecast if information is going to …
Week 10 – Journal Entry
https://www.brieftherapyconference.com/download/handouts/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf After completing the Social Media Disorder scale I met 2 out of the 9 criteria that was asked. Which means that I don’t fall under a diagnosis of “disordered social media user”. The items on the scale are reasonable …
Week 8 – Journal Entry
After watching this video of an ethical hacker analyzing the 12 movie scenes presented to her, the video presents something that I’ve had a problem in how Hollywood depicts and other media influence our understanding about cybersecurity. When I started …