Journal #13: Watch the video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

Investigators in digital forensics draw upon various disciplines, including psychology, criminology, sociology, and ethics, to gain insights into the motivations behind cybercrimes and human behavior. They employ social science principles to navigate moral and legal dilemmas, creating accurate profiles of cybercriminals and adhering to societal norms. Social sciences support the analysis of human-computer interactions, and understanding cultural settings provides valuable context for factors influencing digital crimes. Social science concepts enhance interviewing procedures, while knowledge from political science and public policy aids in navigating legal environments. Recognizing how users perceive cybersecurity threats is crucial for developing effective preventative strategies. Given the interdisciplinary nature of digital forensics, success in the field demands a combination of technological and social science skills.

Overall, the speaker’s path to becoming a digital forensics specialist was commendable. He was willing to learn new things and maintained his determination despite having little experience in the sector, which inspires me. He worked as an accountant, but his knowledge of computers made the transition straightforward for him. Another remarkable aspect is that he was ready and receptive to the new opportunity. Sometimes, we restrict ourselves, which may lead to losing some fantastic opportunities.

Journal #12: Review what the author (Andriy Slynchuk) says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

The article by Andriy Slynchuk identifies several grave infractions that people could unintentionally commit online. Using unapproved streaming services, torrent services, and downloading music from YouTube are serious violations among them. Copyright violations occur with unauthorized streaming and torrenting, affecting entertainment and content providers. The rights of content owners become jeopardized when audio gets taken from YouTube in violation of both copyright laws and the platform’s terms of service. The article also highlights how revealing personal information—like another person’s address or photo—is prohibited and can result in privacy breaches and even injury. Finally, the Children’s Online Protection Act prohibits collecting data on anyone younger than 13. These crimes are dangerous because they violate the law and the rights to privacy, intellectual property, and the integrity of online interactions and information.

Journal #11: Read the “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

Economic Theories:

  1. Information Asymmetry:
  • Description: When one side of a transaction has more or better knowledge than the other, this is known as information asymmetry. The company/platform provider and the clients had a substantial knowledge gap, as evidenced by this data breach notice. Until the firm discovered the infiltration, the consumers were in the dark about it. This idea draws attention to the difficulties and dangers of uneven information availability in business dealings.
  • Relevance to the Letter: Information asymmetry appears because of the delay in discovering the breach and notifying customers. Customers received no notice of the compromise by the firm or the platform supplier, and this information discrepancy may affect the confidence level of future transactions.

 2. Cost-Benefit Analysis:

  • Description: Evaluating the advantages and disadvantages of a choice or course of action is known as cost-benefit analysis. In this instance, the company decided when to notify the clients of the data breach, which likely originated after a cost-benefit analysis by the platform provider and the firm. The advantages of prompt disclosure, such as consumer trust and fast risk reduction, may have been evaluated against the drawbacks, such as possible harm to the business’s image.
  • Relevance to the Letter: According to the letter, the decision to postpone notice was motivated by the current law enforcement investigation. This choice results from a cost-benefit analysis in which the advantages of cooperating with the inquiry proved to be greater than the short-term expenses of delaying disclosure.

Social Science Theories:

  1. Trust Theory:
  • Description: Trust theory examines the importance of trust in social interactions. The letter addresses the breach of confidence caused by the unauthorized access to customer data. Rebuilding trust is crucial in this scenario, and the company’s transparency in notifying customers and providing information on protective measures is an attempt to restore confidence.
  • Relevance to the Letter: The notification reflects the acknowledgment of the breach of trust and the company’s effort to rebuild it by providing customers with information and tools to protect themselves. Trust theory is evident in the communication strategy employed to address the incident.

  2. Social Identity Theory:

  • Description: The study of social identity theory examines how people assign themselves and others to social groups, which affects how they behave and perceive things. Customers appear as a social group suffering from the data incident in the letter. The message seeks to connect with the standard social identity of www.glasswasherparts.com customers.
  • Relevance to the Letter: The message highlights how all customers are impacted collectively by the hack, forging a feeling of identity among those who could get affected. This framing promotes group action to safeguard the common social identity of impacted platform consumers, such as contacting pertinent financial institutions.

Journal #10: Read The Professional Journal of the U.S. Army and write a journal entry summarizing your response to the article on social cybersecurity.

After reading an insightful article on social cybersecurity today, I became aware of its significant implications for national security and the changing face of conflict. The article explained how social cybersecurity is becoming a crucial subfield that will impact both traditional and non-conventional elements of warfare in the future. It draws attention to how the global marketplace of ideas and beliefs can be manipulated at the speed of algorithms to change battlefields at all levels of warfare.
The article focused on how information warfare is changing, with information no longer being a tool for hybrid warfare but rather an end in and of itself. It covered how state and non-state actors use technology to distort narratives, erode public confidence in institutions, and split communities apart. The understanding of the Russian information blitzkrieg clearly illustrated the strategic influence that information operations might exert on a country before the onset of a physical battle.
The contrast between social and conventional cybersecurity piqued my interest the most. Social cybersecurity emphasizes psychological and sociological dimensions of cyber risks, whereas traditional cybersecurity concentrates on technology-targeted assaults. Social cybersecurity includes people utilizing technology to “hack” other people. Understanding social sciences, psychology, and targeted marketing to use cyber media for mass impact is what the phrase “cognitive hacking” embodies.
Social cybersecurity is an emerging multidisciplinary field, blending fields such as political science, sociology, communication science, and other disciplines. The strategic planning behind social cyber operations received particular attention in discussing the Russian state’s deliberate efforts to develop sophisticated mathematical models for information warfare as early as 2003.
The article explored how technology might use open societies to manipulate social dynamics, pointing to aspects like lower barriers to entry and decentralized information flows as supportive evidence. Information and network manipulation were examples of socio-cyber maneuvers briefly explained, emphasizing how they may affect people’s attitudes, ideas, and social structures.
One crucial topic covered was using bots as force multipliers in information operations. Bots, which employ artificial intelligence and machine learning, are increasingly used to carry out timely and targeted information exchanges at scale for various reasons, ranging from vicious propaganda to positive alerts.
The need to comprehend social cybersecurity strategically was underlined in the conclusion to protect against external exploitation of internal flaws. Agile policies are essential for navigating a dynamic information environment, as demonstrated by the request for military commanders to establish policies that allow for flexibility of maneuver in the information domain.
In conclusion, the article emphasized the need to teach the military and the general public about the vulnerabilities involved in the decentralized character of the contemporary information environment and the lack of critical evaluation of information. It presented substantial evidence to create pertinent regulations to safeguard privacy, provide moral flexibility in the information sphere, and establish a multidisciplinary approach to social cybersecurity. Reflecting on these observations, it’s evident that social cybersecurity is becoming more than just a catchphrase; in the field of national security, it will be an essential discipline for the foreseeable future.

Journal #9: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

I have a zero on the Social Media Disorder scale. I experienced cyberbullying in 2017, and as a result, I have deleted all of my social media accounts. I was an average social media user until this event. Since I never imagined this would develop into a condition, I find the items on this scale somewhat concerning. There are a few things that worry me:    

  • Did you ever feel unsatisfied because you wanted to utilize social media more frequently?  
  • Have you tried, but failed, to spend less time on social media?
  • Often used social media as a getaway from negative emotions?

Based on my brief research, I discovered that excessive use of social media can lead to several negative consequences. People may suffer from social isolation, increased rates of anxiety, and depression as a result of continuously comparing their lives to well-preserved online identities. Fear of missing out (FOMO) can cause psychological distress, and issues with privacy and cyberbullying are frequent. The impacts also extend to physical health since screen use is known to cause sleep disturbances and sedentary behavior. Reduced productivity, strained relationships, and abundant knowledge are further challenges. Setting reasonable boundaries and practicing moderation are necessary for a positive, balanced relationship with social media.

Journal #8: After watching the video, write a journal entry about how the media influences our understanding about cybersecurity.

The media strongly impacts the public’s understanding of cybersecurity by framing and sensationalizing issues, which can lead to incorrect impressions and undue alarm. Coverage routinely oversimplifies complex matters and undermines public trust by relying on professionals to convey them. Regular reporting may normalize cyber threats while promoting digital awareness and best practices, which is an educational role. To gain a more educated viewpoint, media consumers should seek numerous sources, develop media literacy, and be aware of the consequences. Responsible reporting is critical for providing accurate information and promoting a balanced awareness of cybersecurity risks in the public sphere.

Journal #7: Review the ten images below using a cybersecurity framework for human systems integration. Make a meme that explains the person’s thought process (s). Describe the connection between human systems integration and your memes.

Image 1: A person sitting in front of a laptop

The caption reads: “When your brain’s firewall is updating, and you realize you left the coffee shop’s Wi-Fi on.”

Explanation: This meme compares the significance of cybersecurity knowledge to the amusing idea of upgrading the human brain’s “firewall” or security defenses. Leaving the Wi-Fi on in a public area is a potential security failure. The meme expresses that maintaining personal cybersecurity awareness is essential for human systems integration, just as we update software for security.

Image 2: Brown and white long coated small dog wearing eyeglasses on black laptop computer

Caption: “When you hire a new ‘Paw-sword’ Security Analyst – Unleashing the Bark Side of Cybersecurity!”

Explanation: This meme plays on words by using the idea of a dog as a cybersecurity expert, highlighting the wordplay with “Paw-sword” instead of “Password.” The canine-wearing spectacles represent a watchful security analyst monitoring the laptop, bringing a lighthearted element to human systems integration within cybersecurity. By using a humorous and cheerful tone to emphasize the significance of cybersecurity procedures, the caption further emphasizes the dog’s role in protecting against security attacks.

Image 3: Man in black and white striped polo shirt sitting on chair in front of silver MacBook

Caption: “When you’re the Human Firewall – Stylishly Blocking Cyber Intruders!”

Explanation: This meme plays on the idea that the man is the “Human Firewall” by putting his silver MacBook in front of him and projecting an air of confidence. The caption adds a personal touch, implying that the person has been neatly preventing internet attackers. This contributes to a humorous and approachable message about the significance of human systems integration in preserving cyber resilience by making a fun connection between the person’s sense of style, the role of a human in cybersecurity, and the notion of thwarting possible attacks.

Image 4: Man sitting on concrete brick with opened laptop on his lap

Caption: “When you’re the Cyber Sentry – Defending the Digital Realm, One Uncomfortable Seat at a Time!”

Explanation: This meme highlights the less-than-ideal circumstances sometimes experienced by people focused on preserving cybersecurity by humorously portraying the man as a determined “Cyber Sentry” stationed atop a concrete brick. The caption injects comedy by highlighting the dedication to protecting the digital sphere—even if it means taking an uncomfortable seat. The message of this meme is that people are essential to cybersecurity and frequently encounter difficulties and discomfort while working to protect the internet.

Image 5: Black smartphone near person

Caption: “When Your Smartphone Becomes the Guardian of the Cyber Realm – Silent Defender, Pocket Protector!”

Explanation: The black smartphone appears in this meme as the “Pocket Protector” and “Silent Defender” of the internet world, which is funny. The caption jokingly implies that the smartphone, frequently a user’s constant companion, protects their digital world. The meme seeks to illustrate how commonplace gadgets serve as individual protectors against online dangers and are essential to the more significant cybersecurity architecture.

Image 6: Woman in white button up shirt holding silver iPhone 6

Caption: “When Your iPhone is the Key to the Cyber Kingdom – Business Casual Defender!”

Explanation: With the iPhone 6, this meme playfully depicts the lady in the white button-up shirt as a “Business Casual Defender,” highlighting her function within the cybersecurity system. The caption emphasizes the importance of personal devices in the larger context of digital security by jokingly suggesting that the iPhone is the key to the cyber kingdom. The meme seeks to communicate that people actively participate in total human systems integration within the cybersecurity landscape through standard technologies.

Image 7: Person holding silver iPhone 6

Caption: “When Your iPhone is the First Line of Cyber Defense – iGuardian Activated!”

Explanation: A meme that shows the person holding a silver iPhone 6 as an “iGuardian” suggests that the smartphone is the first line of defense regarding privacy online. The caption humorously highlights how personal gadgets may support each person’s cybersecurity initiatives. Within the larger context of human systems integration, the meme seeks to communicate that commonplace devices are essential to improving digital security.

Image 8: File: Computer user icon.svg

Caption: “Protector of the Digital Frontier – Where Every Click is a Battle Strategy!”

Explanation: Inventively personifying the computer user symbol as the “Protector of the Digital Frontier,” this meme implies that the icon stands for the unassuming yet watchful custodian of the virtual world. The caption heightens the tension by depicting each click as a calculated maneuver in the continuous struggle against possible cyber threats. The iconic computer user icon is used in this meme to represent each person’s unique contributions to digital security while humorously highlighting the importance of the human element within the cybersecurity framework.

Image 9: File: Summer school GLAM giorno 1 1.jpg: A group of individuals seated at a long table staring intently at their laptop displays as a presenter talks in front of them.

Caption: “When the Cyber Ensemble Gathers – Clicking in Harmony, Securing in Unison!”

Explanation: This image charmingly represents the cooperative attitude of a group holding a cybersecurity discussion. The caption accentuates the idea of a “Cyber Ensemble,” implying that every individual seated at the lengthy table is a musician who contributes to the overall harmony of cybersecurity activity. Through group involvement and coordination, the meme seeks to communicate that human systems integration inside a cybersecurity framework transforms the ordinary meeting environment into a harmonious symphony of secure clicks and interactions.

Image 10: File: Cellphone (16491636068).jpg: A man wearing a winter coat takes a picture of a woman enjoying the snow with his smartphone.

Caption: “When Your Winter Wonderland Pic Raises Cybersecurity Concerns – Unseen Threats Behind the Snowflakes!”

Explanation: Even in a beautiful winter backdrop, this meme gently addresses the issue of unforeseen cybersecurity problems. With an expression of tension, the man in the winter coat, who appeared to be taking a harmless snapshot, now represents the possible hazards that may not always be visible in the digital world. Dramatization is added by the caption, implying that the seemingly benign snowflakes might provide cybersecurity risks. This meme seeks to communicate that, even in circumstances that appear routine, people should always be on the lookout for possible digital dangers in the context of human systems integration.

Journal #6: Can you spot three fake websites, compare them to three real ones, and showcase what makes them fake?

How to tell a fake website from a legitimate one by emphasizing traits in common with fraudulent websites:

Problems with URLs and Domains:

  • Fake Websites: Note any spelling errors or minor name variations in the domain. Cybercriminals frequently generate URLs similar to authentic websites but with minor modifications, including additional characters or letter substitutions for digits.
  • Real Websites: Typically, domain names properly and consistently spelled correctly indicate legitimate websites. Ensure the domain corresponds to the honest brand or organization and look for secure connections (https://) to confirm the website’s legitimacy.

Design and Content Quality:

  • Fake Websites: Fraudulent Websites may have poor content, graphics, and design. Keep an eye out for generic or poorly written text and out-of-place pictures. Additionally, scam websites could not look professional.
  • Real Websites: Well-designed, well-written material and excellent imagery are all investments made by authentic websites. All of the pages retain their pristine and uniform look.

Indicators of Security:

  • Fake Websites: Scammers frequently fail to use safe browsing practices. Verify whether SSL certificates are missing, as the URL indicates, including “http” rather than “https.” Use caution if the website asks for private information via an insecure connection.
  • Real Websites: Legitimate websites may use SSL certificates to emphasize user security. Look for the padlock icon in the address bar, which denotes a secure connection. Furthermore, reliable websites use safe payment gateways for their transactions.

Journal #5: Review the articles linked with each motive. Rank the motives from 1 to 7, the most sensitive (being 1). Explain why you rank each motive.

  1. Political: Politically motivated cyberattacks may significantly impact diplomatic ties, national security, and political stability. Political motivations are extremely sensitive due to the possibility of geopolitical conflicts and the effect on vital infrastructure.
  2. Money: Because financially driven cybercrimes affect people, businesses, and economies.  Financial losses, identity theft, and the interruption of business operations are all possible outcomes of these assaults. Many cybercriminals have financial gain as their primary motivation, which adds to the sensitivity of their actions.
  3. Recognition: Cybercriminals who want to be well-known in hacking frequently participate in events highlighting their abilities. Although this motivation might not directly result in financial loss, it might raise the risk of cyberattacks as people want recognition for their expertise.
  4. Revenge: Cybercrimes driven by revenge can have significant repercussions for the targeted person or organization. These assaults could reveal private information, harming a person’s reputation and perhaps resulting in legal consequences.
  5. Entertainment: Cybercrimes carried out for amusement can disrupt and hurt people or businesses. Such assaults could entail hacking for the challenge’s sake, which could have unexpected repercussions.
  6. Multiple Reasons: Cybercriminals with numerous objectives might pose a diverse danger by fusing aspects of their personal, financial, or political agendas. Multifaceted intentions might be challenging to comprehend and deal with, which makes the attacks much more sensitive overall.
  7. Boredom: Cybercrimes motivated by boredom are frequently spontaneous and lack a clear goal. Even though these actions could cause minor disturbances, they usually have fewer profound implications when compared to more intentional purposes.

To illustrate the varying sensitivity levels in cybercrime, I rated the above motives according to their potential harm, extent, and more significant effect.

Journal #4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

A psychological theory called Maslow’s Hierarchy of wants divides human wants into five levels with rankings according to significance. Priorities are in order of importance: physiological, safety, love and belonging, self-actualization, and esteem. In the context of technology, Maslow’s hierarchy can be used to examine how those of others impact my digital experiences. Technology provides for physiological necessities like food and clothing through applications for food delivery services and online shopping. Antivirus software, password protection, and safe online transactions show how safety demands become apparent. People worldwide are connected via social media, video chats, and online groups, giving me a sense of love and belonging. Social recognition on sites like Instagram or LinkedIn satisfies requirements for self-esteem, while self-actualization is promoted via self-help applications, online learning, and creative outlets. Digital experiences may help or hurt these requirements. For example, using social media excessively can harm real-life connections and make one feel like they don’t belong. Therefore, applying Maslow’s Hierarchy to the technology analysis offers valuable insights into how digital interactions impact a person’s psychological well-being and satisfaction of basic needs.

Journal #3: How might researchers use this information to study data breaches?

Scholars have at their disposal an excellent tool for studying and analyzing data breaches, which is publicly available breach information. Researchers can find common vulnerabilities and attack vectors that bad actors use by looking at the traits and patterns of previous breaches. This information can help create cybersecurity policies and procedures that are more successful in reducing risks in the future. Scholars may examine the categories of information exposed in these intrusions to comprehend cybercriminals’ changing objectives and drives. Reviewing the timeframes and detection techniques of past crises can improve early detection and response procedures. Researchers may help create comprehensive datasets that aid in trend analysis and the detection of future risks by compiling and classifying breach data.
Overall, academics may improve cybersecurity procedures, create predictive models, and contribute to a more secure and resilient digital environment by using publicly accessible data breach information analysis.

Journal #2: Explain how the principles of science relate to cybersecurity.

The following examples show how cybersecurity connects to scientific principles:

The idea of relativism can be understood to suggest that everything is connected via systems in the areas of technology, education, society, the economy, health care, criminal justice, and politics. 

The term “objectivity” describes how scientists conduct value-free research to advance knowledge using probing questions, such as: How should hackers be punished?

Should sex offenders be monitored via technology?

How should we interpret the way white supremacy is promoted online?

How do terrorists spread their crimes through social media?

Maintaining simplicity in scientific explanations is known as parsimony. It would not be easy to explain why certain people commit cybercrime to the general public. However, using the “self-control theory” translates to people breaking the law because they lack self-control, making it more digestible for someone without a solid educational foundation.

According to empiricism, social scientists can only investigate tangible behavior to the senses (such as touch, smell, sight, taste, and hearing), leading to scientific interpretations representing an individual’s experiences. However, scientists have discovered that this kind of research might result in wildly inflated results, resulting in ambiguous understandings.

Ethical neutrality requires that scientists uphold moral norms when doing their research. And this also applies to the study subjects who employ their own empirical and objective methods. Meaning scientists shouldn’t add to or subtract from an individual’s response.

Determinism refers to the idea that action is influenced, caused, or decided by earlier events. Many people have opposed this principle because they think an individual’s behavior can’t be determined by or influenced by prior experiences. The paradigm for deterministic modeling can be used to model the following explanations:

The very few causes of a behavior, like a cyber event, are identified by nomothetic theory.

Idiographic – identifies the various underlying reasons for a behavior across time.

Journal #1: Review NICE Workforce Framework and explain which areas would appeal the most to you.

The areas that appeal the most to how I would like to focus my cybersecurity career are:

Threat/Warning Analyst: Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments. Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Cyber Defense Forensics Analyst (Digital Forensics): Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.

Systems Analysis (Systems Security Analyst): Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security. Studies an organization’s current computer systems and procedures, and designs information systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both.

Cyber Defense Infrastructure Support Specialist: Tests, implements, deploys, maintains, and administers the infrastructure hardware and software. Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

Vulnerability Assessment and Management (Vulnerability Assessment Analyst): Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations.

Security Control Assessor (Risk Management): Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls. Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization’s cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Enterprise Architect (Systems Architecture): Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Leave a Reply

Your email address will not be published. Required fields are marked *