CYSE 201S

Journal Entries

Workforce Framework for Cybersecurity (1)

After reviewing the NICE Workforce Framework, I can safely say that I want to focus my career on a protect and defending an area of work. This area appeals to me the best since I want to focus my career on being a Defense Analyst. In this area of work, there are many different skills that need to be picked up on my career journey. I feel like most of these areas appeal to me in some way, but if I had to say which one didn’t it would be the Overseen and Govern area of work.

How the principles of science relate to cybersecurity (2)

It can be seen that Like the natural sciences, social sciences are equally scientific. These ideas may be utilized to examine cybersecurity using a social science framework. As a collection of methods used to guard against intrusion, harm, and unwanted access, cybersecurity is sometimes referred to as such. The rapidly developing subject of social cybersecurity research aims to combine knowledge of fundamental human behaviors with insights into rapidly changing technology. 

Data Breaches (3)

This website informed me of the types of data breaches that can take place and the types of businesses that can be targeted. Researchers can use this information to study the types of businesses that are more prone to data breaches. Not only that, but they can also see the more frequent types of data breaches that occur in the state that their researching. If they wanted to go more into depth, the website also provides the city where these breaches take place. Overall, researchers can use this data to draw a chart, to see what areas and data breaches are more likely to take place.

“Data Breaches.” PrivacyRights.org, https://privacyrights.org/data-breaches.

Maslow’s Hierarchy of Needs and explain how each level
relates to your experiences with technology.
(4)

Maslow’s Hierarchy of Needs is a motivational theory that categorizes human needs into five levels: physiological, safety, love/belonging, esteem, and self-actualization. Technology helps us fulfill these needs by providing access to information, resources, and social connections. Physiological needs include food, water, shelter, and other basic needs for survival. Safety needs include security, love/belonging, esteem, and self-actualization. Love/belonging needs include social interaction, love, and feelings of belonging. Esteem needs include recognition, respect, and self-esteem. Self-actualization needs include personal growth, achievement, and reaching one’s full potential. Overall, technology plays a significant role in meeting a range of human needs. By providing us with access to information, resources, and social connections, technology has become an essential tool in our pursuit of happiness and fulfillment.

Review the articles linked with each individual motive. Rank the
motives from 1 to 7 as the motives that you think make the most sense
(being 1) to the least sense (being 7). Explain why you rank each
motive the way you rank it. (5)

Entertainment, Politics, Vengeance, Boredom, Recognition, Money, and many causes are the seven motives that are listed. Since many people commit cybercrimes for amusement or to intimidate others from behind a screen, entertainment is thought to be the most common motivator. The second most frequent reason is financial gain since stolen information may be sold or used as blackmail. Since people or governments may leak information for political or financial profit, political motives are rated third. The fourth motivation is retaliation, since some people may use cybercrimes to damage their ex-partners. To show off their abilities and supremacy, people could steal or indulge in hacking, according to ranking five. Sixth rank goes to boredom since some individuals use their leisure time to study hacking skills.

Journal Entry (8)

I think that debates regarding cybersecurity in the media nowadays frequently center on the subject of hacking. The goal of a hacker is typically shown as being easily accomplished in a matter of minutes or even seconds. This oversimplification suggests that cybersecurity is ineffective because hackers seldom ever face significant obstacles.
Due to the easiness with which most hackers appear to work, cybersecurity is sometimes depicted in the media as being nonexistent, even if the phrase “firewall” is occasionally referenced. I don’t blame the media for this because it would be difficult to abruptly interject a network scanning lesson into a spectacular action movie scene.

Complete the Social Media Disorder scale. How did you score? What
do you think about the items in the scale? Why do you think that
different patterns are found across the world? (9)

I obtained a score of 3.0 on the online social media disorder scale exam. To get a more complete picture of people’s social media activity, I think adding more fields to the evaluation would be beneficial. The test I was using at the time appeared a little hazy, and it may be improved by adding a scaled number field. Noting that not all nations have the same degree of technological resources or infrastructure to enable a technology-driven culture, social media usage habits may vary across various countries and areas.

Read this and write a journal entry summarizing your response to the
article on social cybersecurity (10)

After reading the article on social cybersecurity, I was better able to understand the challenges that both military and civilian organizations have when trying to protect their networks from potential cyber attacks. The paper highlights the need of safeguarding against social engineering attacks that prey on human weaknesses in addition to standard IT infrastructure. The need of businesses establishing a comprehensive cybersecurity plan, integrating both technological and social measures to guarantee that their networks are secured against all types of attacks, is one of the article’s key conclusions. This calls for regular training for staff members on how to recognize and react to social engineering attacks like phishing scams and pretexting. The essay emphasizes the importance of leadership in creating a culture of cybersecurity inside organizations, the paper emphasizes the need of leadership, starting at the top, in building a cybersecurity culture within businesses. The protection of sensitive data and information must be a top priority for corporate leaders, who must also make sure that everyone in the organization is aware of the dangers and implementing the appropriate security measures.

Journal Entry (11)

The job description for a cybersecurity analyst in the video shows various societal topics that are pertinent to the industry. The position necessitates a thorough grasp of human psychology and behavior, as well as the capability of recognizing and avoiding social engineering attempts. In order to deceive people into disclosing private information or carrying out malevolent deeds, social engineering assaults focus on preying on human weaknesses like fear, greed, and curiosity. In order to detect and stop these assaults, a cybersecurity analyst must be able to understand and forecast human behavior. As part of their responsibility to find and fix vulnerabilities in the organization’s cybersecurity infrastructure, cybersecurity analysts must collaborate and communicate effectively with others. Overall, a multidisciplinary approach to cybersecurity is essential, and the work of the cybersecurity analyst emphasizes the crucial junction between technology and human behavior.

Journal (12)

The breach letter makes reference to the economic theories of information asymmetry and externalities, which hold that a data leak may be detrimental to a company’s reputation as well as the general public. Social science theories that may be applied to the letter include social learning and social control. According to social learning theory, the company’s response to a breach can serve as a model for other businesses. According to the social control hypothesis, abiding by social norms and standards is essential to avoiding social consequences like bad press and clientele loss.

Journal (13)