Tags » CYSE201S

Posts
Relation to the Principles of the Social Sciences:              Firstly, this study requires the principle of ethical neutrality to be recognized and kept in mind when performing the stu (More)
Relation to the Principles of Social Science:             The study reviewed discusses a study in vulnerability, specifically concerning ransomware that affects organizations. The article its (More)
Introduction:             Penetration testing is defined by Cloudflare, a prominent company in the cybersecurity sphere, as “a security exercise where a cyber-security expert attempts to fi (More)
            I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his c (More)
            Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s (More)
srigg008 wrote: Analyzing Bug Bounties
               In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met cer (More)
            Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle beh (More)
            In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have (More)
               The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the (More)
               I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I th (More)
            Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV (More)
srigg008 wrote: Fake vs. Real Websites
One of the most common methods of gathering personal, sensitive information from the average user is the creation of fake websites. Websites that appear to be from package delivery services, such as FedEx or UPS, are an example. These scam atte (More)
aberr019 wrote: Journal Entry 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Fake Websites waImart.com – This website uses a capitol I instead of an L. washingtonpost.com.c (More)
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Physiological needs: Mobile devices allow me to pay (More)
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal. PrivacyRights.org provides resear (More)
Explain how the principles of science relate to cybersecurity. Cybersecurity is an interdisciplinary field composed of several disciplines that utilize social science principles for their research. Social sciences adhere to the same principles as (More)
Review the NICE Workforce Framework. Are there certain areas that you would want tofocus your career on? Explain which areas would appeal the most to you and which wouldappeal the least. The areas in the NIST Workforce Framework I’d ultimately (More)