Tags » Journal Entries

Posts
            I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his c (More)
            Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s (More)
srigg008 wrote: Analyzing Bug Bounties
               In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met cer (More)
            Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle beh (More)
            In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have (More)
               The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the (More)
               I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I th (More)
            Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV (More)