Week one Journal Entry

Psychology, Sociology, Criminology are the top three careers I would consider. I would study Psychology for the broad aspect of how the human mind works, figuring more out about it every day. Sociology for the study of social aspects and how people act around others. Criminology for the rush of solving/ help solve crime.

Of the three, Psychology would be my favorite for understanding how the human mind works has never fully been understood. There is always more to learn about it as well, which is perfect for someone like me who always likes to learn.

Furthermore, the least favorite I have of the three would be sociology. I truly think it goes with psychology in many ways and easily could be paired together with it.

Week Two Journal Entry

1. Determinism

Behavior is caused, determined, or influenced by preceding events.

In cybersecurity, determinism manifests in understanding that every cyber incident has a cause rooted in prior events. For example, a data breach doesn’t occur randomly; it’s often the result of vulnerabilities like outdated software, weak passwords, or phishing attacks. By recognizing these causal relationships, cybersecurity professionals can trace back through the chain of events to identify how a breach occurred and implement measures to prevent future incidents. It’s like piecing together a puzzle where each piece represents an action or event leading to the outcome.

2. Empiricism

Scientists can only study behavior which is real to the senses.

Empiricism emphasizes the importance of observable and measurable evidence. In the realm of cybersecurity, this means relying on tangible data—such as network traffic logs, system alerts, and user activity reports—to detect and analyze threats. Cybersecurity analysts monitor these real-time data streams to identify anomalies that could indicate a security breach. By grounding their work in empirical evidence, professionals can make informed decisions and develop effective defense strategies based on what’s actually occurring within systems.

3. Parsimony

Scientists should keep their explanations as simple as possible.

Parsimony, or the principle of simplicity, encourages finding the simplest explanation that fits the data. In cybersecurity, this translates to designing streamlined security protocols that are easy to understand and implement. Overly complex security measures can be counterproductive, leading to user confusion or loopholes. For instance, a simple, robust password policy is often more effective than a convoluted authentication process that users might circumvent. Parsimony ensures that security solutions are both efficient and effective without unnecessary complications.

4. Objectivity

Scientists study topics in a value-free manner.

Objectivity is crucial in cybersecurity for unbiased threat assessment. Cybersecurity experts must evaluate threats and vulnerabilities based on factual evidence, free from personal biases or preconceived notions. Whether dealing with internal audits or analyzing external threats, maintaining objectivity ensures that security measures address real issues rather than perceived or exaggerated ones. This impartial approach leads to fair risk assessments and equitable treatment of all potential security concerns.

5. Ethical Neutrality

Scientists must adhere to ethical standards when they conduct their research.

Ethics play a central role in cybersecurity. Professionals are entrusted with sensitive data and must handle it responsibly. Ethical neutrality means they conduct their work without letting personal values interfere with professional duties, while still adhering to moral guidelines. For example, when performing penetration testing (ethical hacking), cybersecurity experts test systems for vulnerabilities without exploiting the information for personal gain. They follow legal and ethical protocols to strengthen security without violating privacy or trust.

6. Interconnectedness (Relativism)

All things are related; without protected systems, multiple aspects will be vulnerable.

The principle of interconnectedness is vividly apparent in cybersecurity. Today’s digital infrastructures are deeply intertwined—compromising one system can have ripple effects across an entire network or even globally. For instance, a cyberattack on a single component of a supply chain can disrupt production, distribution, and customer service on a massive scale. In healthcare, unprotected technological systems can jeopardize patient data, treatment plans, and critical medical equipment. Recognizing this interdependence highlights the importance of comprehensive cybersecurity measures that consider the broader ecosystem.

Week 3 Journal Entry

Publicly available information about data breaches includes breach notifications, government reports, industry analyzes, and media coverage. Researchers can use this information to study patterns and trends in data breaches, identify common vulnerabilities, and evaluate the effectiveness of different security measures. By analyzing this data, researchers can develop better strategies for preventing future breaches and improving overall cybersecurity. Additionally, studying data breaches can help policymakers and organizations understand the impact of breaches on individuals and businesses, leading to more informed decisions about data protection regulations and practices

article-1-Prescott-Kowalski.docx