{"id":120,"date":"2024-04-23T02:53:44","date_gmt":"2024-04-23T02:53:44","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2024-04-23T03:35:55","modified_gmt":"2024-04-23T03:35:55","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/201s\/","title":{"rendered":"Cyse 201s"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">About Me<\/h1>\n\n\n\n<p>Hello my name is Darryl Bannerman Im from Fairfax VIrginia and my ethncity is Ghanaian and im the 2nd born out of 4 kids. I atend Old Dominion Unviersity and my major is cyber security. The reason i got into this major is because my Older brother is a software engineer and told me the Tech field is where the money is and my dad is also working on becoming something in Tech they are both my inspiration and my motivation to get a degree wiith this major.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/GzC3vcgmMxy670QLfbHRcAv3mqkFucBy-QsbRtsTROzkxDqE0hBSeXw3C9tpnbxK_Aj4RLzj6vp8pnZJT6gNTsvdNGxfSM4_ueqnTd68o4bZ6818DxHn5paSUXCdDGDdfYMTWCdOgfmq22zMZxD0SkE\" alt=\"\" \/><\/figure>\n\n\n\n<p>      Article Reviews <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Article 1 Understanding the use of artificial intelligence in cyber crime<\/p>\n\n\n\n<p>When you understand the use of artificial intelligence in cyber crime it can help by seeing how<br>cyber criminals can exploits ai and attack things. When you understand it can help develops<br>strategies to mitigate the risk and protect ai attacks and cyber threats and it also uses the social<br>science principles because understanding human behavior cyber security professionals can help<br>prevent Ai driven attacks. The study for the search question or hypothesis is they are trying to<br>find out why people do what they do in cyber crime and what is their motive and what grabs their<br>attention the most when there trying to attack a system. The type of research methods that were<br>used was gathering participants and interviewing them about why people would attack and what<br>makes them attack and who would be most likely to attack and also read a paper about why<br>humans attack and is it based of personality traits. The power points we have learned in class<br>relates to this article a lot because in class we talk about the social sciences and the principles and<br>this article demonstrates about how the principles of social science are used and how and why<br>people attack systems or do crimes. The data analyst that was used in this experiment was<br>gathering people to participant in an interview to get their opinion or their point of view why<br>people do certain crimes and what most likely motivates them to do these crimes and why they<br>ignore the big risk their taking that could lead them to imprisonment. by being aware of how<br>cybercrime uses artificial intelligence By examining this point, it is possible to create strategies<br>that shield these groups from cyberthreats, guarantee that their opinions are heard when<br>developing cybersecurity measures, and address the issues, worries, and contributions of<br>marginalized groups. The studying the use of artificial intelligence in cyber crime has a<br>significant contribution to society because it helps people understand threats and how to protect<br>themselves from cyber attacks and learn secure measures and with this we can create a safer<br>internet environment for everybody and with the research of this it can benefit everybody. In<br>conclusion understand the use of artificial intelligence in cyber crime can benefit everybody in<br>multiple ways and help people be secure while being on the internet.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Article 2 <\/p>\n\n\n\n<p>Cyberbullying during the pandemic was problematic and has a connection to scientific principles because, according to social science cybersecurity, cyberbullying is a result of human factors that contribute to cyberthreats and vulnerabilities. Cyberbullying also has a psychological impact on individuals and can cause social isolation, which is especially dangerous for college students and other university staff. And in the article that i read they did research and test to figure out responses if people are getting cyber bullied and the research method they used was gathering people and them doing a survey and giving their response and the study was also limited to the university and enrolled college students from freshman to graduate students and they had to be 18 years or older. Also they took surveys on if they where bullied during the time of the pandemic and if they just felt isolated and the amount of times they where on social media. And the research questions they where asking was if people where getting cyber bullied more and how it increased because of the pandemic and how if they felt that being on social media a lot more also played a role in cyberbullying.The data analysis that was done in this was getting participants and having them take the surveys on the topic and helping them collect data. The power points in class relate to this article in many ways because when we discuss about being safe on the internet it also means being safe from bullying we have went over cyber bullying in class in previous modules and power points and i feel like this article helps me understand more about cyberbullying and how it increased during a certain time period. This article pertains to the difficulties and worries that marginalized groups confront since, in addition to social exclusion and discrimination, cyberbullying can increase these problems for them. It can also further isolate them and create negative stereotypes about them. This article makes numerous contributions to the study of society. It clarifies the detrimental effects of cyberbullying on individuals, and by doing so, regulations and educational initiatives that support everyone&#8217;s right to a safer online environment can be developed. In conclusion this article shed a light on cyberbullying very well, also by studying and understanding cyberbullying we can help limit it and make the environment safer for everyone and promote respect and peace and make a positivie difference in our online community.<\/p>\n\n\n\n<p><a href=\"https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1140&amp;context=ijci\">https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1140&amp;context=ijci<\/a><\/p>\n\n\n\n<p>My Career Paper<br>The career that I&#8217;m looking into getting into in cybersecurity is becoming a<br>security analyst. The role of a security analyst is to make sure that organizations are<br>safe from cyber attacks and cyber threats also security analyst requires an advanced<br>skill set to become one. Security analysts have to have a great understanding of<br>cybersecurity from the techniques, tools, and technology. With this, they can help<br>identify vulnerabilities in the security that they can attend to before something goes<br>wrong and make sure the security is effective. Critical thinking is also a factor when it<br>comes to being a cybersecurity analyst because you need to make sure you know how<br>to work in bad situations and know how to detect incoming attacks and know how to see<br>patterns so you can stop the attacks before they occur. Communication skills are also<br>very important in cybersecurity which i think is important for every job because you need<br>to be able to communicate with others so you all can work together to stop anything bad<br>from happening and with communication leads to great teamwork and teamwork is what<br>helps keep a company in tact. Also, a key skill is problem-solving in the cybersecurity<br>world and as a worker for cybersecurity you need to know how to solve security issues<br>fast and effectively and You are most likely to be under pressure but you&#8217;re going to<br>have to face it and get the job done. And with this career, you also have to know how to<br>adapt to the latest technology and security things going on because they&#8217;re constantly<br>updating and things and new things are going to come out and you need to stay up to<br>date so you don&#8217;t fall behind and know how to maneuver your way when your defending<br>attacks. Security analysis also depends on the research and principles of social<\/p>\n\n\n\n<p>science. Like human behaviors play a big role because as an analyst you have to<br>understand human behavior and why they do certain things and with that you can base<br>how you&#8217;re going to take action towards your security and the people doing unlawful<br>things. And the social principles help us understand the factors and the influence that<br>lead to cybercrime. Ethical considerations of the social science principles also help<br>guide security analysts in making good decisions and help them with data protection.<br>The materials we learn in class also correlate to the things the professionals do on a<br>daily routine because we focus on the social principles and the research of social<br>science and focus on cyber security and how we can be safe online and how we can<br>prevent getting hacked or attacks coming our way with doing security measures and<br>making sure we have strong passwords and not clicking bad links and just being careful<br>online. Security analysts act as a middleman between businesses and investors,<br>offering insightful information that shapes market dynamics and investment decisions.<br>Their work also impacts margin sales groups and society at large by influencing<br>economic outcomes. improving market efficiency and safeguarding investors<br>encouraging corporate governance and advancing the goals of social responsibility. IN<br>Conclusion, the position of a security analyst requires a wide range of abilities, including<br>critical thinking, interpersonal communication, and technical expertise. Nonetheless,<br>social science research and ideas must be integrated in order to address the<br>human-centric aspects of cybersecurity and guarantee comprehensive security plans.<br>Security analysts can enhance their comprehension of human behavior, efficiently<br>reduce risks, and cultivate a security-conscious culture in enterprises by utilizing social<br>science insights. Staying ahead of attackers and protecting data will require a <\/p>\n\n\n\n<p>combination of technological expertise and social science knowledge as cyber dangers<br>continue to grow.<br>https:\/\/www.securitymagazine.com\/keywords\/7353-security-analyst<br>https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-anal<br>ysts.htm<br>https:\/\/cybersecurityguide.org\/careers\/security-analyst\/<\/p>\n\n\n\n<p>Journal entry 1 &#8211;\u00a0I would pursue a career as a threat analyst because of the tasks they perform, such as processing data, dealing with cyber threats, and evaluating. Threat analysis also helps identify potential risks and vulnerabilities in computer systems. They also identify potential threats like malware, hacking attempts, and data breaches. This helps keep the cyber world safe from hackers, which is why it appealed to me the most. The amount of money they make is over six figures, which is great for a high-skill requirement job. and the area I would dislike the most is that you always have to be on top of things like making sure your predict events before they happen because one mistake can mess up everything but nobody is perfect so we can prevent all threats.<\/p>\n\n\n\n<p>Journal entry 2 &#8211; Cybersecurity principles are closely related to science and can be applied in a variety of ways, just as science does. Cybersecurity relies on observation skills, experimentation, and analysis to understand and solve risks. Applying scientific principles allows cybersecurity experts to better comprehend the ever-changing threat landscape and develop robust policies to secure systems and data. It&#8217;s like making sure you&#8217;re constantly one step ahead and can&#8217;t go behind. Like in science cybersecurity also has observation so they can detect potential threats or weird behavior. And like in science cybersecurity professional are always learning so they can stay up to date with new threats and things to help stop the threats.<\/p>\n\n\n\n<p>Journal entry 3- They can use the information to help them in the future to prevent any attacks and to stop it from happening all comes down to layers of security to prevent data leaks. Make strong passwords at first, and change them frequently. When it is feasible, use multi-factor authentication; it is revolutionary. Update your software frequently to avoid security risks. Emails and links should be used with caution as phishing scams are a popular means of access for hackers. Make sure you regularly backup your data so you won&#8217;t have to start over in the event of an emergency. Teach the best practices for security to your staff. Finally, think about encrypting important data; it&#8217;s like placing your information in a lockbox.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>journal 5- I rate each and every one a 7 because they all were interesting to me besides the one about revenge because it got a little weird and was awkward I just didn&#8217;t like the topic so I would rate that a 2 because I wouldn&#8217;t want to know about that or even think that people are out here doing crimes by exposing people like that. And also the one about boredom also caught me off guard because it was talking about sexual grooming of children which I find disgusting and weird so I would rate that a 4 because people do have to know about it so we can prevent it from happening in the future.<\/p>\n\n\n\n<p>journal 6-Abcnews.com.co is a fake website from the real ABC News but it can trick people because it has the same logo and a similar name to the original ABC News and the site had published fake stories about Donald Trump.\u00a0 Yournewswire.com this is a fake website and spotted being fake when it was spreading false rumors about first lady Michelle Obama unfollowing former President Clinton on twitter. 70news.wordpress.com is another fake website that was caught spreading fake news about Trump winning the popular vote by 700,000 when he didn&#8217;t and was also spreading rumors about Hillary Clinton being scared and was saying she wasn&#8217;t fit to be the president of the United States.<\/p>\n\n\n\n<p>journal 7 &#8211;<\/p>\n\n\n\n<p>file:\/\/\/C:\/Users\/dbann003\/Downloads\/annotated-Untitled%2520document%2520%252860%2529%20(1).pdf<\/p>\n\n\n\n<p>journal 8- The media can easily influence people of wrong perceptions of cybersecurity or real perceptions by helping the people understand the risk of doing bad things online like hacking and also it can help influence people who want to stop bad people from stealing information to join them and can also raise awareness for cyber threats and help people understand the people that try to do it and the reasoning behind it so they can be protected\u00a0<\/p>\n\n\n\n<p>journal 9- I scored 3\/9 and I felt like the items on the scale was very great asked questions. and different patterns are found across the world because there are multiple ways to ask these type of questions .<\/p>\n\n\n\n<p>journal 12-  the economic theories are Market failure theory, which contends that a variety of flaws may prevent markets from allocating resources effectively, can be used to examine this data breach notification. In this instance, the hack shows that the market was unable to offer sufficient cybersecurity protections. Businesses could underinvest in security measures until a breach happens if they fail to fully internalize the costs of data breaches. In order to prevent more breaches, businesses should reevaluate their cybersecurity investments in light of this notification, which serves as proof of market failure.<br>Game Theory: In competitive contexts, game theory helps with strategic decision-making. Businesses and hackers play a never-ending &#8220;game&#8221; in which they attempt to outwit one another when it comes to data breaches. The social science theories are Social Exchange Theory: Based on the ideas of reciprocity and mutual benefit, social exchange theory investigates the dynamics of social connections. As part of the social exchange with the impacted parties, the corporation gives help resources and recognizes its breach in the context of the data breach notification. The organization seeks to uphold goodwill and confidence with its clients by offering aid such credit monitoring services and channels of support, cultivating a constructive relationship in spite of the breach.<br>Conflict Theory: Conflict theory looks at how inequality and power dynamics affect institutions and social interactions. When there is a data breach, there is a conflict between the impacted individuals\u2014who could feel like they have less control and privacy\u2014and the company, which is in charge of the individuals&#8217; personal information. in conclusion These theories from the social and economic sciences offer analytical frameworks for comprehending the nuances of data breaches and the reactions of the impacted parties, including businesses and individuals.<\/p>\n\n\n\n<p>Journal 13-The use of the policies that I&#8217;ve seen by reading this article is that it plays a very important role in helping establish rules and regulations for the systems and to help the data from cyber threats and attacks. And how they enforce this is by making sure the responsibilities and procedures are taking care of and making sure everything is secured. They also create a strong foundation and also can address security issues before they can be attacked by hackers and sure that everybody and everything is secured on the internet.<\/p>\n\n\n\n<p>Journal 14 &#8211; Andriy Slynchuk lists a number of potentially unlawful activities that Internet users might partake in, emphasizing how grave these activities are in relation to the law. Five of them stand out as being very important because of the potential for harm and legal ramifications. First of all, breaking into computer systems or networks without authorization is a serious crime since it compromises the security and integrity of digital infrastructure, which may result in data breaches or the interruption of vital services. Second, distributing content protected by copyright without authorization affects companies that depend on creative works by violating intellectual property rights and depriving producers of their just pay. Third, committing online fraud, like phishing or identity theft, can cause victims to lose money and undermine confidence in online transactions, posing a threat toserious risks to consumer confidence and economic stability. Fourth, because internet platforms allow abusers to operate anonymously and across geographic boundaries, cyberstalking and harassment pose major risks to people&#8217;s safety and wellbeing. Last but not least, engaging in hate speech online or inciting violence can have serious repercussions for society, upholding prejudice, dividing people, and even igniting physical violence, endangering democratic principles and social cohesiveness. These transgressions are serious because they violate established legal and ethical norms and have the potential to harm people, businesses, and society as a whole.<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About Me Hello my name is Darryl Bannerman Im from Fairfax VIrginia and my ethncity is Ghanaian and im the 2nd born out of 4 kids. I atend Old Dominion Unviersity and my major is cyber security. The reason i got into this major is because my Older brother is a software engineer and told&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/201s\/\">Read More<\/a><\/div>\n","protected":false},"author":28574,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/users\/28574"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/pages\/120\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/201s\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}