Hello! My name is Andrew Byrd, and I am a freshman here at Old Dominion University. My intended major is Cybersecurity and I hope to pursue this field of work in the future. I first got interested in this field when I heard about cybercrimes dealing with fraudulent activities, this interested me and made me want to learn more about the subject.

Currently, I have a work study job on campus and I enjoy going to the gym on my free time. My goals for this class is to pass the course, but primarily to gain a better base understanding. I hope that this class helps to set myself up for a future in the cyber world. Thank You!

CYSE 201S

Week 3 Journal Entry

By using a comprehensive history of the events leading up to a breach, researchers can investigate breaches using the information from this website. Examining incident reports and system logs will yield them. Researchers can use this to better understand the attack vector, strategies, tactics, and protocols used by threat actors. Researchers can identify anomalies or patterns that may indicate criminal behavior by analyzing network traffic during a breach. This could entail monitoring communications with command and control servers for any questionable activity or potential data theft. Researchers also use threat intelligence feeds to get insight into the strategies, methods, and practices connected to certain malware families or threat actors. This data aids in anticipating upcoming assaults and assigning breaches to recognized threat groups.

Week 4 Journal Entry

Maslows Hierarchy is a pyramid where the foundation is our physiological needs. This pretty much the basic needs for survival. On the technology side of this it would include access to internet, phones, and etc. The internet is almost essential when it comes to things like ordering products, filling out healthcare, banking, and even housing. The next thing on the pyramid is safety needs. Online, the safety realm is met through privacy and cybersecurity. All things like passwords, financial safety fall into this field. the third part of is the social need. Including social media and other communication apps. All of these play a major role today when it comes to talking and socializing with people online. Getting to the top of the pyramid is esteem needs, these are things that make us feel whole whether its comments or any sort of recognition. At the very top is self-actualization which can provide us with creativity. The internet can be used to help us become the best version of ourselves. This could be by reading apps, blogs, or educational videos. All of these have a significant impact on my life today whether it’s doing my school work online or receiving emails for work and my classes. Social media today is so large and almost everyone uses it, it is a way that people can know people and stay up to date on current issues.

Week 5 Journal Entry

In my personal opinion I think that the motives should be rated as shown below.

1.Money- It is something everyone strives for and wishes they could have more of so they do what they know to get money. Although some make the argument that the spend the money on unnecessary things, more than likely they already bought things similar and can just buy on a bigger scale because they have money.

2.Political- Although it is wrong, many people have such a strong political view.

3.Recognition- The feeling of achievement and being able to prove and show off what they can do anonymously.

4.Entertainment- Some people just feel joy in hacking, and in the article it shows that it can be justifiable.

5.multiple reasons-

6.Boredem- Targets many young people which is very sad and can be scary.

7.Revenge- Just doing it for bad, it can affect a persons mental health nd violates their privacy.

Review 1

Andrew Byrd 

Professor Aslan 

Article view #1 

02-09-2024 

Attitudes Towards Cybersecurity policies and Cyberattacks 

Social science 

In order to understand the attitudes of cybersecurity we must understand the social aspect of it. Computer social science methods are employed in social cybersecurity to detect, oppose, and evaluate the effects of communication goals. The strategies and conclusions in this field are crucial because they promote communication, journalism, and marketing research procedures that are widely acknowledged. Also, it is important to stick to “the scientific principles of relativism, objectivity, parsimony, ethical neutrality, and determinism” (Moss 1). 

Hypothesis 

According to acedemic.oup.com , they hypothesize that “Exposure to (i) lethal or (ii) nonlethal cyberattacks will lead to greater support for adopting cybersecurity policies compared with people who were not exposed to any cyberattack. In other words, exposure to cyberattacks—lethal (LC) or nonlethal (NLC)—will increase support for adopting cybersecurity policies, as compared with a control group.” This claims that whether people expierence a lethal or nonlethal cyberattack, they will greatly support the adoption of cybersecurity policies. It is noted that after a cyber-attack people commonly tend to stress more and are more aware of their personal security. 

Research methods 

Although earlier studies have shown how political attitudes are impacted by cyberattack exposure, the mediation function of threat perception has gone unnoticed. This study tests how exposure to fatal and nonlethal cyberattacks affects support for various cybersecurity policy types using a controlled randomized survey experiment design. Research from academic.oup.com shows that People’s willingness to accept cybersecurity rules from the government that restrict their civil rights and privacy will vary depending on the kind of cyberattacks they have experienced and the perceptions around those experiences. 

PowerPoint 

In the power points that we go over in class it proves that the behavior of hackers directly correlte to the severity of their hacking. But as important as the hackers are the victims are just as important. Different types of behaviors put us at risk for different types of cybercrimes. Their have been instances of victims who dont even know they are victims. Many of the victims share common traits such as openess, agreeableness, extraversion, conscientiousness, and neuroticism. ndividuals’ behaviors can increase the 
risk of cyber victimization.  

Overall 

In concusion exposure to cyberattacks predicts support for cybersecurity regulations. However, the fact that there are various effects based on the kind of cybersecurity policy being suggested adds a new level of complexity that needs to be further explored in future research. The personalities of hackers can effect how they hack and the extent to what they hack. On the other end of the spectrum is the victim of these people, this can happen to anyone so it is important to tey to spread safety and awareness. 

Week 6 Journal Entry

Three fake websites I found were, Pacific Northwest Tree Octopus, All About Explorers, and Dog Island. Some differences that are easy to spot between real and fake websites is seeing a page that describes whose writing and what the purpose of the writing is. Another sign is seeing pieces of a section missing in any of the text. A lot of fake websites also have many pop-up ads that can cause viruses or allow hackers into your information. People are frequently tricked by fake websites that use domain names with the company name slightly misspelled or with a few letters inverted.

Week 7 Journal Entry

Week 10 Journal Entry

I answered yes on very few of the questions and realized that the biggest problem was just allowing myself to get on the app whenever I feel bored or feel like I have nothing better to do. The question that spoke to me the most was when asked about if I have ever tried to take a break from social media or use it less but then fail and go back to my old ways. I think staying disciplined when it comes to phone usage is important because it is so easy to turn to social media and lose track of time or get sidetracked. I think that these patterns are found across the world because social media is endless, its impossible to watch every video on the internet so really its endless. That’s why its so easy to get addicted and fall into a trap of being stuck on social media.

Week 11 Journal Entry

This article discusses the evolving landscape of military operations in the digital age, focusing on the emergence of cyberspace as a critical domain of warfare. It delves into the significance of cybersecurity in modern military strategy and the challenges posed by cyber threats to national security. The article likely explores various aspects of cyber warfare, including defensive and offensive capabilities, the integration of cyber operations with traditional military tactics, and the implications for military doctrine and training. Overall, it provides insights into the complexities of cybersecurity within the context of contemporary military operations.

Week 12 Journal Entry

Two different economic theories that can be seen in this short letter is the fact that they could be losing customers how they are going to spend money to upgrade systems so that it doesn’t happen again. From an economic standpoint, sending a letter is the best that you can do because at least now your are customers re informed nd have a sense of trustworthy

Week 13 Journal Entry

Acknowledgement of policies is an essential tool for directing companies in the face of changing cyberthreats. Policies help to shape an institutional culture of cybersecurity knowledge and responsibility by defining explicit rules and practices. Furthermore, the assessment highlights how dynamic cyber threats are, underscoring the significance of flexible policies that can successfully address new threats.
The findings are discussed in further detail, which highlights the complexity of cybersecurity policy implementation. It clarifies how businesses frequently struggle with problems like resource shortages, regulatory complexity, and compliance concerns. In spite of these obstacles, the conversation emphasizes how important it is for enterprises to give careful policy creation and execution top priority in order to successfully reduce cyber threats

Career Paper

Andrew Byrd 

CYSE 201S 

04-05-2024 

How Cybersecurity Analyst Depend Upon Social Sciences 

What is a Cybersecurity Analyst? 

Cybersecurity analysts play an important role in keeping an organization’s digital assets safe.  It is important to understand that the job requires not just the knowledge of cybersecurity, but the function of human behavior. The main responsibility of the analyst is to identify potential weaknesses and vulnerabilities in the organization’s security design. Estimating the risk of flaws and vulnerabilities offers help to create plans to reduce that risk. Cyber analysts also monitor networks and systems, investigate security disturbances, and some even collaborate with IT professionals to help develop security. 

What are Social Science Principles? 

Social science principles are what guide societies, individuals’ behavior, and interactions between people. Through this we can understand various phenomena and can apply it to things like sociology, psychology, anthropology, economics, and geography. Social structure is a portion of social principles, which is the relationship in which individuals, or a society of individuals are set up and how they act. Culture is a form of expression and individuality in a group of people, including language, food, beliefs, and values. Society stratification is the arrangement of people based upon things like wealth, power, or social status. All these things that were just named are very predominant when talking about social science principles. These things make up a foundation for understanding the behavior of individuals. 

Correlation Between Cybersecurity Analyst and Social Science Principles 

The correlation between analysts and social science principles is prominent. Although the cyber field deals with technology, human interactions and social structure play a large factor in dealing with shaping cybersecurity risk and outcomes. The mindset/mindframe of an individual has a substantial impact in what type of cybercrime they commit, how they commit it, and why they commit the crime. Many people have different morals and disciplines, which provides ethical reasons for why they do the things they do regarding cybercrimes. Social customs and principles are important for people in the cybersecurity field because it helps professionals be more effective when implementing training and reduces the likelihood of human error. In today’s day and age, privacy is something that is becoming a problem because of how fast things can travel via the internet. Social scientists explore breaches of information and surveillance and find stability between security and the rights of individuals and how they affect society. “Social scientists analyze communication patterns, power structures, and decision-making processes within organizations to identify potential vulnerabilities. By recognizing the influence of organizational culture on security practices, cybersecurity professionals can tailor security awareness programs, implement effective policies, and foster a culture of security consciousness across all levels of an organization.” (Dianizami 1) 

Conclusion 

 In conclusion, the views of social science in the cybersecurity field continue to expand the understanding of human behaviors which helps analysts take down threats and vulnerabilities in a more organized and regulated way. As we accpet the importance of technology in today’s age, we must adjust and also learn the behavior, social structure, and culture of individuals to stay safe from cyber-attacks. 

Dianizami. “Unveiling the Role of Social Science in Cybersecurity.” Medium, Medium, 7 June 2023, medium.com/@dianislami96/unveiling-the-role-of-social-science-in-cybersecurity-76b6ac09e26b#:~:text=Organizational%20Culture%20and%20Security%20Awareness,and%20its%20impact%20on%20cybersecurity. 

“What Does a Cybersecurity Analyst Do?” Western Governors University, 28 Jan. 2024, www.wgu.edu/career-guide/information-technology/cybersecurity-analyst-career.html#:~:text=A%20cybersecurity%20analyst%20is%20a,anticipate%20and%20prevent%20these%20attacks

Week 14 Journal Entry

Five of the 10 illicit online actions covered in the essay stand out as very serious transgressions because of the possible legal repercussions and social ramifications. First of all, unauthorized sharing of copyrighted material is illegal since it violates intellectual property rights and jeopardizes the livelihood of content providers. Second, in addition to breaking copyright rules, online piracy—which includes downloading or sharing content that is protected by copyright without authorization—causes the entertainment sector to suffer large financial losses. Thirdly, engaging in online harassment or cyberbullying is a grave breach of privacy and can be harmful to the mental health and general wellbeing of victims. Furthermore, committing online fraud—such as identity theft and phishing scams—puts people’s confidence and financial security at serious danger. Last but not least, engaging in hacking activities—such as breaking into computer systems without authorization or stealing data—can lead to serious legal repercussions, jeopardize sensitive data, and create systemic vulnerabilities. Because of the possible harm that these five transgressions could cause to people, companies, and the integrity of online ecosystems, they are all considered significant.

Review 2

Andrew Byrd
Article Review 2
CYSE201S


Attitude towards cybersecurity policies


Political choices on international relations, government, and regulation are frequently a part of
cybersecurity strategies. Political scientists examine the power dynamics and how governments
design cybersecurity policy, they also watch the implications for international security. Along
with this, research shows how international agreements and organizations influence
cybersecurity norms and collaboration. The article questions if “exposure to cyberattacks
influence public support for intrusive cybersecurity policies? How do perceptions of cyber
threats mediate this relationship?” The article pretty much states that Although earlier studies
have shown how political attitudes are impacted by cyberattack exposure, the mediation function
of threat perception has gone unnoticed. This study tests how exposure to fatal and nonlethal
cyberattacks affects support for various cybersecurity policy types using a controlled randomized
survey experiment design.


The data used is quantitative and uses a lot of numbers to give the reader a better understanding.
There are frequently gaps in marginalized populations’ access to technology and the internet. By
guaranteeing fair access to digital resources, cybersecurity policy must address these inequities.
The digital divide can be closed and marginalized populations given more power to protect
themselves online via policies that encourage community access centers, cheap broadband
access, and technology subsidies. Cyberbullying, online abuse, and cybercrime frequently target
marginalized communities. The prevention and mitigation of these dangers should be the top
priority for cybersecurity policies. This can be achieved by enforcing stricter laws against cyber

harassment, offering victim support services, and encouraging resilience and digital knowledge.
Policies that support online abuse of marginalized groups should also address underlying societal
injustices and prejudices. The underrepresentation of marginalized communities in the
cybersecurity industry restricts their access to leadership and job opportunities in this crucial
subject. By funding educational and training initiatives aimed at underrepresented groups,
establishing professional promotion routes, and cultivating inclusive workplace environments,
cybersecurity policies should support diversity, equity, and inclusion. Developing effective
cybersecurity solutions that cater to the demands of all users requires a diversity of ideas. In
conclusion, to guarantee fair protection in the digital sphere, cybersecurity regulations must be
sensitive to the difficulties, worries, and contributions of excluded groups. cybersecurity policies
have the potential to better serve the interests of all people and communities, regardless of their
identity or background, by tackling systemic hurdles, fostering representation and inclusion, and
giving community participation top priority.

https://academic.oup.com/cybersecurity/article/6/1/tyaa023/6047253?searchresult=1

Week 15

The video mostly concentrates on the technical side of digital forensics, but it also makes clear how connected it is to the social sciences in a few important ways like understanding human behavior and its impact on society. For digital forensics investigators to examine digital evidence efficiently, they need to have a solid understanding of human behavior. In the video, investigators talk about using psychological profiles to forecast suspect behavior and comprehend their motivations. This illustrates how the social science field of psychology and digital forensics interact. When talking about the impact on society, professionals in digital forensics frequently look into crimes that have a big social impact. Identity theft, cybercrime, and online harassment are just a few examples of the crimes that have the power to upend people’s lives and communities. Digital forensics investigators contribute to the restoration of order and security in society by locating digital evidence and apprehending offenders, underscoring the wider social ramifications of their work.