srigg008 wrote: Digital Forensics as A Career
I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his c (More) | |
srigg008 wrote: The Severity of Potentially Unknown Internet Uses
Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s (More) | |
srigg008 wrote: Analyzing Bug Bounties
In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met cer (More) | |
srigg008 wrote: Data Breaches and Economic Theories
Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle beh (More) | |
srigg008 wrote: The Cybersecurity Analyst Career
In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have (More) | |
srigg008 wrote: The Increasing Need for Social Cybersecurity
The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the (More) | |
srigg008 wrote: The Social Media Disorder Scale
I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I th (More) | |
srigg008 wrote: Hacking Scenes in Movies Compared to Reality
Hacker Rates 12 Hacking Scenes in Movies and TV, a video that is part of Insider’s How Real Is It? series on their YouTube channel, details different hacking scenes from various TV (More) |