Derek Miranda’s E-Portfolio CYSE 201S
My name is Derek Miranda, I am a criminal justice major and I like to play video games. I am on the esports team and also in a fraternity.

Week 1 journal entry
The areas that would appeal to me the most would be analyzing, protecting and defending, as well as securely provisioning. I say these because they are the ones that have my interests in what I would do. They are things I have already been thinking about doing. I like things that have stuff to do with analytics because I find it easy to understand and it is something I have passion for. Stuff I have less appeal in is investigating because I do not like spending time to trying to figure something out and it is not always guaranteed that I will. Oversee and govern is another thing I have less appeal to because I find myself getting angry trying to help people and also watch over them because it would fall on me rather than on them.
Week 2 journal entry
The principles of science, particularly those concerning systematic observation, experimentation, and validation, are deeply relevant to the field of cybersecurity. In cybersecurity, the nature of digital threats, vulnerabilities, and attack vectors are analyzed and understood through the application of rigorous scientific methodologies. Similar to other scientific fields, cybersecurity tests serve as controlled environments where ideas regarding system vulnerabilities and security measure effectiveness are verified and validated through experiments. Gathering and evaluating data is essential to seeing trends, anticipating breaches of security, and creating effective countermeasures. Also, the sharing of threat intelligence and best practices within the cybersecurity community reflects the principles of peer review and collaboration.
Week 3 journal entry
PrivacyRights.org provides resources and information related to data breaches, including a Data Breach Chronology that lists reported data breaches in the United States. This data could be used by researchers to examine patterns and trends in data breaches over time, examine the kinds of data that have been compromised, identify the most affected industries or sectors, and understand how breaches effect customers. They might also look into how laws and regulations have changed in relation to data breaches, evaluate the efficacy of various security precautions, and investigate the long-term effects of data breaches on people and businesses.
Week 4 journal entry
Each level of Maslow’s Hierarchy of Needs has a deep intersection with technology, demonstrating the critical role it plays in meeting both simple and complex human needs. Digital services such as online meal delivery and health apps, which guarantee access to nourishment and track well-being, fundamentally address physiological demands. As you move up the ladder, encrypted financial transactions and security technologies provide peace of mind by meeting safety concerns. By maintaining our connections with friends and family, social media and communication platforms help us satisfy our needs for love and belonging. Professional development and recognition are made possible by platforms such as LinkedIn and other e-learning websites, which in turn support esteem demands. The internet, the ultimate in self-actualization, provides countless tools for identity expression, creative endeavors, and personal growth.
Week 5 journal entry
Sorting the reasons for cybercrime based on implausibility provides a fascinating insight into the motivations of those who commit these crimes. First and foremost, money is the most compelling reason. The immediate benefit of gaining money off of illicit activity is a strong motivator, making “For Money” the most likely explanation. “Multiple Reasons,” which acknowledges the complexity of cybercriminals’ motivations and suggests that complex attacks are frequently fueled by a combination of variables, follows in second. Third ranked is, that “political” motivations are indicative of the growth in hacking and cyber-espionage, which is motivated by the desire to sway public opinion or affect political outcomes. “Revenge” comes up at number four because some cyberattacks have a strong emotional motivation stemming from personal grudges. Fifth ranked goes to “Recognition,” where people may turn to cybercrime to gain approval in particular societies. The fact that “entertainment” is listed sixth indicates that, although the act’s thrill or fun shouldn’t be undervalued, it has a less clear purpose than other reasons. Finally, “Boredom” I viewed as the least likely motive. It frequently serves as a contributing element to cybercrime when paired with other factors. This hypothetical ranking emphasizes the complexity and diversity of cybercrime motivations, underscoring the significance of comprehending these forces to successfully counteract such actions.
Week 6 journal entry
In contrast to legitimate websites, fake ones are easily recognized by their subpar design, typos, shady URLs that vaguely resemble well-known businesses, and absence of a secure HTTPS connection. For instance, trustworthy websites with professional layouts, secure HTTPS connections, and simple URLs that correspond to their brand names are found on sites like Amazon, Bank of America, and eBay. On the other hand, fraudulent rivals like Amaz0n-deals.com, BankofAmericc.com, and eBay-deals.today frequently have crowded designs, misspellings, and deceptive URLs that are meant to fool users. They also lack the security precautions that legitimate websites take to safeguard user information. These disparities show how crucial it is to carefully examine a website’s URL, level of design, security features, and content correctness to discern between trustworthy and dishonest online businesses.
week 8 journal entry
The media plays a role, in shaping how people view cybersecurity often being the way many people learn about and judge the seriousness of cyber threats. When the media sensationalizes stories it can increase fear and worry focusing mostly on cyberattacks and advanced hacking incidents. This emphasis may give the public an idea of how severe these threats are. It might make people think that cybersecurity matters mainly for IT professionals and big companies. Sometimes media reports. Don’t fully explain the complexities of cybersecurity leading to misunderstandings or wrong beliefs about how individuals can protect themselves. Despite these challenges, the media also has a chance to teach and empower people by explaining cybersecurity issues pointing out risks, and offering practical advice. Finding the balance between raising awareness and giving information is vital for creating a knowledgeable and strong digital society. It emphasizes that media outlets must connect cybersecurity experts with people, in our interconnected digital world.
Week 10 journal entry
After going through the Social Media Disorder Scale and responding affirmatively to six questions it’s clear that my social media usage follows a pattern that could be seen as disordered based on the criteria. This self-reflection underscores an impact, on my life such as being overly focused on social media and struggling to cut down usage despite trying and facing negative consequences in personal relationships and activities. The items in the scale provide an assessment of the ways social media can influence one’s life emphasizing not just time spent but also broader effects on mental well-being, social connections, and daily functioning. The diversity in how social media is used can be explained by cultural, economic, and individual disparities. These factors influence how individuals interact with technology illustrating the relationship, between user habits, societal expectations, and the features of social media platforms.
Week 11 journal entry
After reading “Social Cybersecurity; An Emerging National Security Requirement”, by Lt. Col. David M. Beskow and Kathleen M. Carley I was struck by the importance of cybersecurity emphasizing how crucial information is in warfare much like an “information blitzkrieg.” This new area of focus highlights a shift from cybersecurity to a comprehensive approach that takes into account how technology can influence human behavior and societal norms. The conversation about how both state and nonstate actors use the global information landscape to create chaos and undermine trust in institutions shows that we are facing a battleground that requires a strategy. We need to be proactive, in understanding and addressing these evolving threats to safeguard security and stability in today’s interconnected era.
Week 11 journal entry
The responsibilities of a cybersecurity analyst are closely tied to grasping and addressing the aspects that impact cybersecurity risks and weaknesses. In addition, to monitoring and safeguarding networks and systems this role involves delving into dynamics that can jeopardize or safeguard an organizations resources. Concepts like trust, privacy and the psychology underlying social engineering attacks play a role. Cybersecurity analysts must navigate the relationship between behavior and technology understanding how social engineering leverages human tendencies—such as the inclination to assist or fear of authority—to circumvent technical security measures. Moreover analysts frequently play a part in educating staff on practices emphasizing the significance of culture and awareness in cybersecurity. This focus on aspects underscores the fusion of expertise and interpersonal skills in countering cyber threats showcasing the analysts function as a conduit, between digital and human security elements.
Week 12 journal entry
The data breach notification letter, from Glasswasher Parts raises issues that can be examined through the lenses of both economics and social sciences. Economically the letter discusses information asymmetry and externalities. Information asymmetry becomes apparent as customers were unaware of the data risks until after the breach affecting their ability to make informed decisions about their purchases. The breach also leads to externalities, where the consequences (such as identity theft and financial loss) extend beyond the company to innocent third parties like consumers who were not involved in the security decisions that resulted in the breach. From a social sciences standpoint, the letter introduces concepts of trust, social capital, and risk perception. Trust and social capital play roles, in customer business relationships; a breach can significantly damage this trust, impacting interactions and the company’s image. Risk perception theory focuses on how individuals evaluate and respond to communicated risks of their data being compromised influencing reactions aimed at safeguarding their identity and financial security. Together these theories provide an understanding of the effects of a data breach. From implications and consumer behavior to trust dynamics and societal norms.
Week 12 journal entry
The article thoroughly examines the effectiveness and dynamics of bug bounty programs offering a look, at how these initiatives play a role in enhancing cybersecurity. It discusses the skepticism some companies have toward third-party cybersecurity reports and the increasing adoption of vulnerability disclosure policies (VDPs) driven by governmental bodies. The study emphasizes that bug bounty programs, which incentivize freelance security researchers with rewards significantly improve a company’s ability to identify and address vulnerabilities—a benefit that is not necessarily tied to the company’s size or reputation. Interestingly it indicates that hackers are not greatly influenced by prices indicating that even companies with resources can gain benefits from these programs. Additionally, it points out that factors specific to industries and the longevity of bug bounty programs can impact the number and types of vulnerabilities reported. This evidence contributes to an understanding of the cost-effectiveness and significance of bug bounty programs in modern cybersecurity efforts advocating for their widespread adoption, across various industries to mitigate cyber risks.
Week 13 journal entry
Andriy Slynchuk talks about a variety of behaviors that internet users may unknowingly participate in some of which could be illegal. These include using streaming services that violate copyright laws utilizing torrent services to access pirated content using copyrighted images without authorization sharing personal information such, as passwords or addresses without permission resulting in privacy breaches and engaging in cyberbullying or trolling that could have serious psychological effects on individuals and potentially result in legal consequences. These actions are taken seriously due to their implications for copyright infringement, invasion of privacy and harm, to individuals.
Week 15 Journal entry
Looking back on the career of a forensics investigator it’s evident how deeply connected this field is, to the sciences. This profession extends beyond recovering and examining data from devices; it involves grasping the cultural, psychological, and societal influences that shape human actions. In a discussion, an experienced investigator shared his journey which cleverly blended computer science with aspects of sociology and psychology. He delved into cases related to cyberbullying, fraud, and even terrorism highlighting the dilemmas like privacy issues and handling data that come up. These dilemmas call for a foundation in sciences stressing the importance of ethics, legalities, and human understanding in conducting their inquiries. His experience underscored how dynamic digital forensics is always adapting to tech landscapes while considering the social impact tied to these crimes. This profession isn’t about know-how but also about recognizing and addressing the human aspects behind online interactions demonstrating the crucial overlap, between technology and social sciences.