Week 1 / journal entry 1
NICE WORKFORCE FRAMEWORK FOR CYBERSECURITY :
The Workforce Framework for Cybersecurity, or NICE Framework, is a tool that helps
employers build their cybersecurity teams. It includes categories like Work Roles,
Competency Areas, and a bunch of tasks, knowledge, and skills to help define
cybersecurity work. For me, the areas I’d want to focus on are Cyber Defense Analysis
and Vulnerability Assessment. I like the idea of diving into threats and figuring out how to
protect systems it’s hands on and exciting. On the other hand, areas like Legal Advice
and Advocacy doesn’t really interest me as much because they’re more about policies
and regulations, which aren’t as exciting to me as the technical side of things.
Week 2 / journal entry 2
The scientific basis of online safety is closely connected to cybersecurity.
Empiricism is the way in which cyber security professionals design better defenses using actual data.
I.e. previous cyber attacks. Determinism: There are new cyber threats in some form that are frequent and can be identified and prevented from happening.
This is because of the principle of parsimony which states that simple solutions are preferred over complex ones.
This is because cybersecurity analysts have to remain objective when assessing the risks and tendencies should be based on data rather than personal opinions.
These concepts help to enhance the reliability of the data protection, breach prevention and threat response policies which the professionals are able to develop.
Therefore with the help of scientific approach cybersecurity can be made to fit the dynamic digital environment.
Week 3 / journal entry 3
Researches can use the Data Breach chronology to determine frequencies , sequences , and the extent of cybersecurity incidents by studying them over the years. The database includes Information n publicly reported breach notifications from U.S government agencies, which enables spatio temporal analysis of which industries are most impacted , the most frequent vectors of attacks are hackers, lost or even stolen devices and how much breach reporting has changed over time. since the data either state , organization and type of breach the researchers can contrast the differences and effects of geographical regions and regulations. but there is a problem with omissions,many notifications are not very specific and do. not contain information on the actual cause or scope of the breach.this source assists cybersecurity professionals , policy makers , and analyst in the creation of more effective prevention measures by revealing weaknesses and how varying regulations influence he reporting of breaches.
Week 4 / journal entry
Maslow’s Hierarchy of Needs is closely related to my use of technology on a daily basis. In the
physiological level, tech assists with simple needs like ordering food from apps or using smart
devices to remind me to take water. In the safety category, cybersecurity is a big deal, it
includes strong passwords, two factor authentication, and VPNs to safeguard data from cyber
threats. The Belongnessess is realized through social media, messaging apps, and online
gaming, where I and others can communicate with friends and family. Recognition in the form
of LinkedIn recognition, coding accomplishments, or even gaming leaderboards increases
confidence at the esteem level. Free will and personal growth are expressed through online
learning whether it is through cybersecurity courses, research or even YouTube tutorials.
Technology isn’t only a tool but also a significant way of my development and communication
with the environment.
Week 6 journal entry
Fake websites
1. Fake Apple ID Verification Website
•Fake URL: appleid.apple.com.secure-login.com (appears to be a
subdomain of Apple but is actually a deceptive domain).
•Legitimate URL: appleid.apple.com.
Identifying Features:
•Misleading Subdomains: Fraudulent sites often use subdomains to
mimic legitimate URLs, making it appear as though you’re on an official page.
•Requests for Sensitive Information: Legitimate companies like Apple
will not ask for personal information through unsolicited communications.
•Urgent Language: Scammers create a sense of urgency to prompt
hasty actions without due diligence.
2. Fake Amazon Login Page
•Fake URL: amaz0n.com (uses the number ‘0’ instead of the letter ‘o’).
•Legitimate URL: amazon.com.
Identifying Features:
•Slight Misspellings in URL: Subtle changes, such as replacing letters
with similar-looking numbers, are common in fake URLs.
•Lack of HTTPS: Legitimate sites use HTTPS; absence of this
indicates a potential security risk.
•Poor Website Design: Low-quality images and unprofessional
layouts are red flags.
3. Fake Microsoft Office 365 Login Page
•Fake URL: office365.verify-account.com (adds misleading words to
the domain).
•Legitimate URL: office.com or login.microsoftonline.com.
Identifying Features:
•Extra Words in Domain: Adding terms like ‘verify-account’ is a tactic
to deceive users.
•Unsolicited Login Requests: Be cautious of unexpected prompts to
log in, especially if received via email links.
•Generic Greetings: Legitimate communications often address you by
name; generic salutations can be a sign of phishing.
General Tips to Identifying Fake Websites:
•URLs: Look for misspellings, extra words, or unusual characters.
•Security Certificates: Ensure the presence of HTTPS and a padlock
icon in the address bar.
•Assess Website Content: Poor grammar, spelling mistakes, and
unprofessional design are warning signs.
•Links in Unsolicited Emails: Instead, navigate directly to the official
website by typing the URL yourself.
Week 7 journal entry
week 8 journal entry
How the Media Influences Our Understanding of Cybersecurity
The media plays a big role in shaping how we think about cybersecurity. News outlets
often focus on big hacks or data breaches, making it seem like cyber threats only
happen to big companies. But in all reality, regular people are targeted all the time
through phishing, weak passwords, and social engineering. Movies and TV shows also
create unrealistic ideas, making hackers look like geniuses who can break into any
system in seconds. This can make cybersecurity seem too complex for the average
person, when in reality, small steps like using strong passwords and enabling two factor
authentication can help a lot. Social media also spreads misinformation, making it harder
to know what’s true. Overall, the media influences both our awareness and our
misunderstandings about cybersecurity.
Week 10 journal entry 9
Journal entry 9/ social media
I scored 3, & I think the items in the scale make sense because they ask real questions
about how social media can affect peoples mood, time, and relationships. It’s kind of eye
opening to see how deep the impact can really be.
Different patterns around the world happen because people live in different cultures,
have different rules, access to social media, or even different values about technology
and social media and not everyone uses it the same way.
journal entry 10
kon Deng
Based on the article , social cybersecurity is a totally new area of national security that
focuses on protecting people and societies from online threats like misinformation and
manipulation. The article explains how modern warfare isn’t just about physical battles
anymore but also about influencing beliefs and opinions through the internet. For
example countries like Russia use tactics like fake news, bots, and social media
manipulation to cause division and confusion in other nations.
Unlike traditional cybersecurity, which protects systems and data, social cybersecurity is
about “hacking” people changing how they think, what they believe, and how they
interact with each other. The article also talks about the “BEND” model, which shows
how attackers can either support or disrupt online conversations and social groups.
The main point is that open societies, like the U.S., are more at risk because they allow
free speech, making it easier for false information to spread. The authors argue that the
military and government need to better understand this threat and create stronger
policies to fight it.
journal entry 11
Akon Deng
A cybersecurity analyst’s job relates to social behaviors because it involves more than
just protecting computers it’s also about understanding how people interact online. The
article shows that attackers use social media to spread false information and create
division. Analysts have to study how people share and respond to content so they can
spot these threats. Social themes like trust, influence, and how people communicate are
important because the goal is to change how people think and act without them even
realizing it.