My name is Bobby Booker and this website is for CYSE 201 or Cybersecurity as a Social Science
Journal Entry 1: Ann’s behavior online is a main reason for cybersecurity. She did not realize that she was hit by a cyber attack from a fake email. Cybersecurity helps prevent scenarios like this from happening too often. She suffered from a phsishing attack that is usually used to take login information and other types of important data. A firewall can help her and prevent hackers from getting in as easily. Also using unique passwords can be part of cybersecurity and be a help to her information.
Journal Entry 2: I think that I would want to focus my career on threat analysis. Supporting law enforcement and stopping cybercriminals would appeal the most to me. Mainly because it would be exciting but also I’m sure it feels good stopping cybercriminals from committing crimes. Also working in cyber operations appeals to me because it deals with cyber-terrorist and real-time threats. The least important one to me is customer service because I feel as if it is not exciting as dealing with criminals.
Journal Entry 3: Not all cybersecurity professionals are hackers however, hackers are out there, and there are some ways to study them. We could study the reason as to why they are hacking, asking questions like what is the motive? Also, understand that hackers are diverse, there isn’t a specific group of people hacking or going into people’s computers. Pay attention to how hackers are hacking. Studying what type of attack is coming to a specific organization is a good way to organize cybercriminals and how they work.
Journal Entry 4: I believe it is ethical to study certain people in cyberspace without their knowledge. If certain people have repeated suspicious activities on the internet it could prevent something dangerous from happening. Certain individuals on the internet browse illegal websites, strange internet searches, and other possibly malicious activities on the web. In conclusion, I say it is ethical to study people in cyberspace as long as there is a good reason as to why they’re being studied.
Journal Entry 5: I rank the motives from most sense to least sense as; Multiple Reasons, For Money, Entertainment, Boredom, Revenge, Political, Recognition. Multiple reasons is ranked 1 because to me it would make the most sense to have more than one reason to hack someone or something. Money is the 2nd reason because money is important to most people. To get by in life we need money therefore it makes sense that a hacker would hack for money. Entertainment is high still at 3rd because it is probably exciting to hack someone, hackers most likely have a thrill while hacking someone. Boredom is lower at 4th because I believe that there are better ways to get rid of boredom than risking jail time by hacking. For example, you could play a game about hacking or watch hacking movies rather than actually doing it. Revenge is 5th because there are also probably easier ways to get revenge rather than hacking someone’s account. Political is 6th, I feel as if you see all the other reasons more often than a political reason for cybercrimes. Recognition is last because the last thing you should want as a cybercriminal is to get caught and with more recognition the more likely it is to get caught.
Journal Entry/ Free Write 6: Part 1, I think the factor that most people will find interesting is the fact that the pay is very lucrative. Now it does seem somewhat selfish to think so but, this may be the factor for people deciding they want to go into the field or not. As Sandra said, this is a fulfilling field and that will also be a factor however, the money is part of the fulfillment you get working in cybersecurity. Also, another factor that people will pay attention to in my opinion is having fewer requirements to get into the field. The college experience looks good however, there are other ways than college to get into this field.
Part 2.
Journal Entry 7: The media definitely influences how the world sees hackers. Hacking sometimes has a negative connotation that isn’t necessarily true. Media can make seem hacking a lot faster and easier than it actually is. However, there are a few real-life terms and experiences that hackers in real life that can compare to hackers in movies. For example: Hosting a CTF or using certain commands to rework or change files. So really there are some elements from real-life put into hacking movies however, it makes it look false as well because of how fast they hack in movies.
Journal Entry 8, Part 1: Ruben has embedded himself into the cybersecurity field by getting his name out there and being on the news. He has hosted cyber conferences and meetings. His knowledge of getting into someone’s data so easily is somewhat scary. Ruben used his computer to get the computer’s info and to also hack the robotic bear. As Ruben said, “If a twelve-year-old can do it then what makes a skilled actual cyber-terrorist not able to do it?” In the way that he speaks it seems as if he is saying as long as someone knows what they’re doing, they could hack you and take your information instantly. Some people may feel as if there is some secrecy when it comes to this field a few years ago, it is much bigger now and more people have knowledge on it as well.
Part 2: This video closely relates to the fraud subculture. It relates to this because of the lyrics and acts being done in the video. In this video, there is a big emphasis on money but more specifically, scamming people out of their money. For example the lyrics: “We go rob the bank, No, we don’t use guns, just close your account once you get the funds.” To me, this means once you get your money then close the account because the bank may or may not be able to catch you and your acts. There are also a few lyrics where the rapper is asking a woman if she wants to commit fraud. This is definitely part of the fraudulent culture, people could also commit these acts in the real world.
Journal Entry 9, Part 1: As any type of security analyst, you need to be a critical and systematic thinker. Living in high costing cities can be stressful but if you can handle it, it can be a good job for you. Another social behavior she mentions is the fact that you should have certifications in cyber so that you can know the information and how to use it. However, most cyber security jobs require many social aspects rather than technical aspects.
Part 2: I didn’t answer yes to any of the social media questions. I believe that those are accurate questions to decipher whether or not a person has a social media problem. I think that some places use social media more than others because of certain circumstances that individuals may be brought into. For example, there is not much social media use in North Korea because of the laws implemented on the internet in North Korea.
Journal Entry 10, Part 1: I think the most serious action that could be illegal is faking your identity as someone else. This should be a crime as the user is tricking people that they are someone important or someone of romantic interest. The second most serious action is using other people’s networks. Someone could accidentally use someone else’s network but that means more hackers or other infiltrators could have easy access as well. Sharing other people’s passwords, addresses, or photos of others is also a very serious action. I think this could lead to serious jail time in the future. Illegal searches on the internet should be a serious crime as well. Searches of bomb tutorials or child pornography are easy searches to get on the FBI’s watchlist. And finally, I think extracting videos from youtube as mp3 is a violation because there are people who pay for those services yet you are getting them for free.
Part 2: I think it relates to cybersecurity because everyone who is affiliated with Old Dominion University gets access to technological aspects of the university. While you are connected to ODU the school could have access to many things on your personal devices. They state: Electronic messaging systems and communication services are provided by Old Dominion University for the purpose of enhancing productivity and maintaining effective communication. Some could want to take advantage of their offers and use them for infiltration purposes.
Journal Entry 11: Cybersecurity and AI could become very intertwined in the future. AI’s have a mind of their own and they will become more connected with humans and our society. While we are getting more AI functions that means computers with their own minds are starting to get our information more. This could be good or bad because if an AI were to malfunction it could release its information and data to hackers who find it valuable. The world is becoming more digitalized, AI and cybersecurity are both parts of that.
Part 2: Criminology could be part of A.I. embedded into cyber security because understanding how criminals work use A.I. in illegal hacking is important. Criminals get more and more creative and using a highly intelligent A.I can make crimes harder to solve and networks harder to protect. Many social sciences connect cybersecurity and A.I.
Journal Entry 12: The Jack Daniels and weed comment to me is hilarious. I think he was overexaggerating, however, I think Instagram is very addicting maybe more so than the alcohol/weed. Instagram over the past few years has kept people to their screens but it doesn’t mean that it is worse than getting addicted to alcohol or drugs. The earlier kids are on drugs the higher of the possibility that they lose brain cells. I do not believe that kids lose brain cells over Instagram.
Part 2: I don’t think cyber victimization gets reported because people are perhaps scared about what could happen to them. Maybe the person who victimized them has their personal information, therefore, if they do anything wrong to the criminal they can get their information and data leaked. Or because of the thought that cybercriminals won’t be charged even if the victimization does get reported.