In this section of my blog, I will be posting my journal assignments, where I cover various topics related to cybersecurity and social sciences. These reflections and responses will explore the intersection of technology, security, and societal issues, offering insights and personal perspectives based on my research and learning.
Journal Entry 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
After reviewing the data breach information at privacyrights.org, researchers can analyze the nature of the breach and which industries are most affected. Industries that can be affected are healthcare, marketing, government agencies, and much more. For example, healthcare organizations are often targeted due to the sensitive nature of patient data. This can further tell which organizations or individuals might be attacked in the future. By figuring out the main targets for these data breaches, researchers can predict risk and develop strategies. This can further help with the development of security protocols and frameworks that can be implemented within the organization. Focusing on high-risk sectors can allow for more protection measures to be adopted.
Journal Entry 5
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- For money
- Political
- Multiple reasons
- Recognition
- Entertainment
- Boredom
- Revenge
After reviewing individual motives I will rank them in the following order with one being the motive that makes the most sense to me. I am personally not a political person, so the main motive that makes sense to me would be for money. Times are hard and the economy is not in the best state right now. This leads to my second pick, political motive. Like I stated the economy is struggling and this can be tied to our political system. Even other counties are unhappy with the way the United States is being handled. This gives motive to many criminals to commit cyber crime. This already transitions into my third pick, multiple reasons. If you are a criminal and you need a reason to commit a crime. Most likely it will take multiple reasons to convince yourself. As we move further down the list, recognition and entertainment are close in terms I feel as pointless. No need to gain recognition or entertain yourself with crime. These are ranked higher than boredom and revenge as they are the worst of the group in my opinion and should never be a motive for anyone to commit a crime.
Journal Entry 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.
Social cybersecurity is how technology can influence human behavior, social, cultural, and political outcomes. Unlike traditional cybersecurity, which focuses on protecting information systems. Social cybersecurity deals with using technology to “hack” human behavior, affecting how people think, feel and act. This can be done through targeted messages, persuasive tactics, and social media. The passage also notes this is considered an emerging area within national security. This is considered a new type of warfare, information warfare. This aims to disrupt societies by targeting their values, institutions, and trust. The article argues that the U.S Department of Defense must understand and prepare for the growing threat by social cybersecurity in order to defend effectively.
Journal Entry 11
Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
The role of a cybersecurity analyst can be considered an entry level job, but the entry level role does not lack importance in cybersecurity. The analyst must also understand the psychology behind why people share or believe in certain narratives, as this impacts the effectiveness of cyber threats. This job involves understanding how information impacts human behavior, beliefs, and social interactions. A cybersecurity analyst needs to recognize how the manipulation of information can also shape public opinion and create distrust within society. This connection between cybersecurity and social behavior highlights the importance of cybersecurity analyst within the cyber field, as it is not only restricted to technical skills