top of page

E Portfolio

This page is dedicated to my eportfolio for CYSE201s

Motives Ranked

        When it comes to cyber crime and motives ranked I believe they should be ranked as such

1. For Money

2. Political

3. Revenge

4. Recognition

5. Multiple Reasons

6. Entertainment

7. Boredom

        I believe it is ranked this way because when it comes to the world of money it is one of if not the greatest motivators to get someone to do something. Everyone needs it to survive and if place in a position they greatly need it they will doo anything and everything they can. Next comes political as I believe if people lose trust in their government someone will want to step in to help others especially if they have been wronged by them in some way whether it choices that cause them to lose more money or the candidate they wanted did not get elected. Next I believe revenge is high up on this last as if someone is hurt in an unimaginable way they will do anything to get revenge on the person that put them in that position. Recognition comes in at number 4 as I believe these type of people do it just to have their name displayed on the big screen. There is usually a higher motivation before it gets to this point. The same goes for the last three as they are all stemmed from a higher motivation and are products of the top 4. They typically wouldn't happen unless triggered by some other event or motive.

Websites and their counterparts

In todays society there are many look alike websites and it can be trick to tell which is the proper website. One proper way that can prevent many of these issues is by verifying the websites url is the one you wanted to go to.

image.png

Real

This is the real abc news website and is validated by Google's CA

image.png

Fake

This is a fake abc news that lead a different news site called the Hollywood's gazette

image.png

Real

This is the real Fox news website and is validated by Google's CA

image.png
image.png

Fake

A website by foxnews24.com was setup to mimic fox news but now is a malicious website used to scam people

image.png

Real

This is the real USA Today news website and is validated by Google's CA

image.png

Fake

This website was used to publish false information and spread misinformation amongst those who frequented USA Today

After Watchin the youtube video

In movies, hackers and their skills are frequently portrayed inaccurately. One of the many aspects of hackers that are exaggerated in movies is how quickly anything can be hacked. In general, movies offer the notion that reading code or hacking something can be done quickly. it would take a long time to sift through the code or hack into something. Additionally, in movies, objects are created that do not exist in reality, giving the idea that hackers possess these abilities. In general, hacker prowess in movies is exaggerated. The idea that skilled hackers might easily gain access to anything comes from movies. This implies that nobody is really safe or secure when they are online.

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

One economic theory that is pertinent to this letter is the laissez-faire doctrine. This view holds that governments shouldn't get engaged in the economy unless it's absolutely required to protect their constituents. In this case, the government is intervening to protect the users whose data may have been compromised. Another economics theory that is pertinent to this correspondence is the Cost/Benefit Analysis. The purpose of this is to weigh the advantages and disadvantages of alerting the users about the compromise that was reached. Finding the choices that are ideal for a person or a business is another goal of this study. The rational choice theory is one social science theory that is applied to determine the best course of action in a particular circumstance. to determine which choices will ultimately result in the best outcome. Additionally, the person receiving this information uses this concept to determine the best course of action to take in light of the fact that their information is at risk. Deterrence theory is also relevant to this letter. The item or person who committed the crime feels that it was worth it. determining that the possible consequences of being found out are not severe enough. As a result, the person is not convinced. When it comes down to it, people who are found guilty of crimes should face tougher penalties or imprisonment from the government. 

 A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

The fact that bug bounties are a useful policy for building a more secure network should not be surprising. Generally speaking, a company will ultimately experience a hacking or cyber breach. Cybersecurity is typically an academic field that was created in reaction to an event. One way the bug bounty industry has kept one step ahead of the competition is by establishing bounties. Both hackers and the company profit from bug bounties. A bug bounty program not only tells a corporation about cybersecurity vulnerabilities but also gives hackers a way to earn money or build their reputation.

 Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube https://www.youtube.com/watch?v=Pf-JnQfAEew Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

It was interesting to find out that when the speaker began his employment or profession in digital forensics, there were no classes or courses available. He was a former accountant who liked fiddling with computers and thought IT sounded like fun. As a result, he was exposed to IT occupations. He ultimately found work in digital forensics through his accountancy firm. It's fascinating to hear about someone's experience in the IT industry before it became as popular as it is now. Careers in information technology are both in high demand and in high demand right now. 

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most severe violations and why you think those offenses are serious.

Bullying/trolling, obtaining information about children, establishing an identity online, unlawful searches, and sharing passwords/addresses/or photos of persons are the five most significant infractions. Bullying and trolling are always serious charges since they can cause considerable harm even when done online. While trolling may appear to be harmless comments or jokes, there are human people behind the screens, and there is a very real risk of violence. It is exceedingly risky to collect information on children. Because the internet is a dangerous place for children, obtaining information about them can imperil them. Faking an identity online is just as unlawful as it is in person; a person's online identity reflects their physical identity, thus if someone steals an individual's information, they can try to harm their reputation or their lives. While illegal searches may appear to be harmless, there is always the possibility that someone truly wants the information that they are looking for, putting many people's lives in jeopardy. It is a serious offense, for example, if someone intends to manufacture a bomb and searches for instructions on how to do it. Finally, exposing someone's passwords/addresses/or images without their permission is very dangerous because many malevolent actors will go out of their way to cause harm, including stalking, kidnappings, and other crimes.

bottom of page