srigg008 wrote: The Social Impact of Cybercrime Risk Among University Students
Relation to the Principles of the Social Sciences:
Firstly, this study requires the principle of ethical neutrality to be recognized and kept in mind when performing the stu (More) | |
srigg008 wrote: A Study in Ransomware Severity and the Effect on Organizations
Relation to the Principles of Social Science:
The study reviewed discusses a study in vulnerability, specifically concerning ransomware that affects organizations. The article its (More) | |
srigg008 wrote: The Role of the Social Sciences in Penetration Testing
Introduction:
Penetration testing is defined by Cloudflare, a prominent company in the cybersecurity sphere, as “a security exercise where a cyber-security expert attempts to fi (More) | |
srigg008 wrote: Digital Forensics as A Career
I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his c (More) | |
srigg008 wrote: The Severity of Potentially Unknown Internet Uses
Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s (More) | |
srigg008 wrote: Analyzing Bug Bounties
In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met cer (More) | |
srigg008 wrote: Data Breaches and Economic Theories
Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle beh (More) | |
srigg008 wrote: The Cybersecurity Analyst Career
In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have (More) | |
srigg008 wrote: The Increasing Need for Social Cybersecurity
The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the (More) | |
srigg008 wrote: The Social Media Disorder Scale
I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I th (More) | |
srigg008 wrote: Hacking Scenes in Movies Compared to Reality
Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV (More) | |
srigg008 wrote: Fake vs. Real Websites
One of the most common methods of gathering personal, sensitive information from the average user is the creation of fake websites. Websites that appear to be from package delivery services, such as FedEx or UPS, are an example. These scam atte (More) | |
aberr019 wrote: Journal Entry 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
Fake Websites
waImart.com – This website uses a capitol I instead of an L.
washingtonpost.com.c (More) | |
aberr019 wrote: CYSE 201S - Journal Entry 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Physiological needs: Mobile devices allow me to pay (More) | |
aberr019 wrote: CYSE 201S - Journal Entry 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
PrivacyRights.org provides resear (More) | |
aberr019 wrote: CYSE 201S - Journal Entry 2
Explain how the principles of science relate to cybersecurity.
Cybersecurity is an interdisciplinary field composed of several disciplines that utilize social science principles for their research. Social sciences adhere to the same principles as (More) | |
aberr019 wrote: CYSE 201S - Journal Entry 1
Review the NICE Workforce Framework. Are there certain areas that you would want tofocus your career on? Explain which areas would appeal the most to you and which wouldappeal the least.
The areas in the NIST Workforce Framework I’d ultimately (More) |