Week 15 – Journal Entry 15

Getting to Know a Digital Forensics Career My understanding of digital forensics was significantly changed by a TEDx talk presentation.  The speaker (Bill Burnett) is a digital forensics investigator. Shared his story of how he happened to fall into this line of work by accident. Even though he was originally trained as an accountant. His…

Week 13 – Journal Entry 14

Five Most Serious Internet Offenses From the list of infractions provided on the site by Andriy Slynchuk, I believe the following are the most frequently infringed without realizing they are prohibited. Using unofficial streaming and torrent sites to pirate content directly violates copyright laws and threatens producers’ livelihoods. Unauthorized use of copyrighted photographs violates intellectual…

Week 11 – Journal Entry

Cybersecurity Analyst Job and Social Behaviors The video provides an overview of the cybersecurity analyst role, emphasizing its importance in protecting networks from assaults and breaches. Given the ever-changing nature of cyber dangers, key social issues include the need for adaptability and continual learning. It emphasizes the role’s demand across multiple industries, providing chances for…

Week 1 – Journal Entry

NICE Workforce Framework The NICE Workforce Framework provides a comprehensive perspective on the workforce in the field of cybersecurity, which covers a wide range of specializations. The sections under “Protect and Defend,” which concentrate on the implementation and management of security measures, and “Analyze,” which involve an in-depth investigation of cyber risks, are very intriguing…

Week 10 ­- Journal Entry

Social Media Disorder Scale As someone who doesn’t use social media, I didn’t personally score myself on the Social Media Disorder Scale. However, reflecting on the likely items included in the scale—such as time spent on social media, the emotional impact of not accessing it, and its effects on daily responsibilities—it’s clear that these measures…

Week 8 – Journal Entry

Media Influences on Cybersecurity Understanding I think the media portrays cybersecurity and its significant impact on public perceptions. Hacking depictions in films and television shows frequently exaggerate the speed and ease with which hackers can circumvent security measures, prioritizing entertainment over accuracy. These depictions tend to oversimplify the nature of cybersecurity, portraying hackers as either…

Week 7- Journal Entry

Human-centered Cybersecurity Framework Photo Scenario: An individual staring intently at a computer screen with a puzzled expression. Meme Concept: Caption it with, “When you’ve changed your password too many times and can’t remember the latest one.” Human-Centered Cybersecurity Relation: Highlights the challenges of password management and the need for user-friendly authentication methods that enhance security…

Week 6 – Journal Entry

Spotting Fake and Real Websites Real: Amazon.com has security control in place, correct URL spelling, and detailed contact information. Fake: amaz0n.shop may have a similar design but uses a URL that is very closely like the real one, lacks security they used HTTP, and provides unclear contact information. 2. Bank of America (real) vs. BankofAmerica.financial…

Week 4 – Journal Entry

Maslow’s Pyramid of Needs Maslow’s Pyramid of Needs relates significantly with my experiences with technology. Basic needs, safety, sense of belonging and self-actualization can all be achieved and enhanced through technology. Technology provides tools and mechanisms that help improve our mental health and privacy needs. Smartphones include features that make like very inconvenient like GPS…