aberr019 wrote: Journal Entry 15
Watching Davin Teo's TEDx talk on digital forensics was truly inspiring. His journey to his career in cybersecurity and forensics wasn't linear, but it was a testament to his curiosity and determination. Initially, he seemed to be just a young perso (More) | |
aberr019 wrote: Journal Entry 14
Among the violations from the clario.co blog article "11 Illegal Things You Unknowingly Do on the Internet", several are particularly serious due to their legal, ethical, and personal consequences.
Using Unofficial Streaming Services: This often (More) | |
aberr019 wrote: Journal Entry 13
This article examines the concept of bug bounties, a technique companies use to contract hackers to discover bugs and weaknesses in their systems’ infrastructure. This method of beefing up security is beneficial for a company by providing a cheape (More) | |
aberr019 wrote: Journal Entry 12
The sample data breach notification relates to the cost/benefit analysis and Laissez-fare economic theories. Cost/benefit analysis can be applied as the business chose a service provider and the cybersecurity offered, weighing the cost of other pote (More) | |
aberr019 wrote: Journal Entry 11
Social themes that were raised during the Cybersecurity Analyst job outlook video that directly related to the job itself were outlined in the broad descriptions of the day-to-day work. She highlighted many of the junior tasks, in respect to entry l (More) | |
aberr019 wrote: Journal Entry 10
The article "Social Cybersecurity: An Emerging National Security Requirement" by Lt. Col. David M. Beskow and Kathleen M. Carley discusses the growing importance of social media platforms in national security. The authors highlight how cyber threats (More) | |
aberr019 wrote: Journal Entry 9
I scored a 3 out of 9 on the Social Media Disorder scale. I believe when answered accurately, these questions may provide a good framework for identifying unhealthy relationships with social media, however I believe it may take more than a simple qu (More) | |
aberr019 wrote: Journal Entry Week 8
The entertainment industry incorporates bits of realism into media for special effect purposes, however these depictions significantly influence public perception of what cybersecurity is and what goes on behind-the-scenes in technology. Anything th (More) | |
aberr019 wrote: Journal Entry Week 7
This individual, after realizing what he has done, sits on the ledge dramatically, pondering his mistake and the consequences of becoming a victim of phishing. This meme tackles cyber literacy and the psychology surrounding victimization.
(More) | |
aberr019 wrote: CYSE 201S - Journal Entry 5
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive (More) |