Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. (Week 13)
After reading the article “11 Illegal Things You Unknowingly Do on the Internet” what I believe to be the top 5 serious out of the list and my reasoning behind it is below:
Read the article and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings. (Week 12-2)
The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometimes notify the organization … Read More
Read the “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. (Week 12-1)
An economic theory used within the data breach notification is laissez-fare theory. The theory believing that government shouldn’t interfere with the economy unless to protect an individuals inalienable rights. With the breach resulting in customers names, addresses, and credit card information … Read More
Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. (Week 11-2)
In the video, I noticed that she mentioned gaining experience in a multitude of different ways. Whether it be from school, church, or seeking an entry-level job. Lifelong learning was mentioned in some form by making sure to collect or … Read More
Read the article “An Emerging National Security Requirement” and write a journal entry summarizing your response to the article on social cybersecurity. (Week 11-1)
I see this field as an essential aspect of national security for the United States. With its focus on understanding and planning around behaviors that might arise from social, political, or cultural scenarios, its uses to assist with safety are … Read More
Article Review #2: An Unhealthy Take on Cybersecurity
Almost everyone at some point in their life has a need to go to a hospital or medical care facility. In most cases, before the care can be administered or the issue(s) documented in a patient record, personally identifiable information … Read More
How does the media influence our understanding about cybersecurity? (Week 8)
Although cybersecurity can be a complex and difficult field to work in, its role within movies or TV shows seldom displays the true nature in which cybersecurity tasks are completed. In doing so, the perception of cyber threats, hackers, and … Read More
Create a meme explaining what is going on in the individual’s or individuals’ mind(s), and explain how your meme relates to Human Systems Integration(HSI). (Week 7)
The meme relates to human systems integration by having an organization host a training session on topics that will educate employees on multiple issues that will influence better cybersecurity practices throughout the organization after an employee fell victim to a … Read More
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?(Week 6)
When I am trying to identify if a website is fake, the first thing I will do is confirm the URL. Are there any slight variations in the spelling, double letters, extra numbers? With most legitimate sites, they are now … Read More