Tags » CYSE201S

Posts
Relation to the Principles of the Social Sciences:              Firstly, this study requires the principle of ethical neutrality to be recognized and kept in mind when performing the stu (More)
Relation to the Principles of Social Science:             The study reviewed discusses a study in vulnerability, specifically concerning ransomware that affects organizations. The article its (More)
Introduction:             Penetration testing is defined by Cloudflare, a prominent company in the cybersecurity sphere, as “a security exercise where a cyber-security expert attempts to fi (More)
            I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his c (More)
            Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s (More)
srigg008 wrote: Analyzing Bug Bounties
               In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met cer (More)
            Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle beh (More)
            In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have (More)
               The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the (More)
               I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I th (More)
            Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV (More)
srigg008 wrote: Fake vs. Real Websites
One of the most common methods of gathering personal, sensitive information from the average user is the creation of fake websites. Websites that appear to be from package delivery services, such as FedEx or UPS, are an example. These scam atte (More)