journal entries

Maslow’s Hierarchy of Needs consists of five levels: physiological, safety, love/belonging, esteem, and self-actualization.

  1. Physiological: Technology supports basic needs, like accessing food delivery apps during busy times.
  2. Safety: Online banking and security features provide a sense of financial safety, protecting my information.
  3. Love/Belonging: Social media platforms foster connections with friends and family, enhancing my sense of belonging.
  4. Esteem: Achievements in online gaming or receiving positive feedback on social media boost my self-esteem.
  5. Self-Actualization: Educational apps and online courses enable personal growth, helping me pursue hobbies and develop new skills.

Each level illustrates how technology enhances my life, fulfilling needs from basic survival to personal growth.

Journal Entry #5

1. For Money

LinkHP Threat Research Explanation: Financial gain is often the primary motive for many cybercriminals. The potential for significant profit from activities like hacking, fraud, or selling stolen data makes this motive the most compelling and understandable.

2. Political

LinkEconomic Times on Hacktivism Explanation: Political motives, particularly through hacktivism, are increasingly relevant. Many young hackers are driven by a desire to effect change, making this motive significant in today’s political climate.

3. Revenge

LinkNews from Wales on Revenge Porn Explanation: The emotional drive for revenge can lead individuals to commit serious crimes, such as revenge porn. This motive is compelling because it ties personal grievances to harmful online actions.

4. Recognition

LinkThe Register on DDoS Attacks Explanation: Seeking recognition, whether through notoriety or validation from peers, can be a strong motivator. The desire for status in hacker communities or to prove oneself can drive cybercriminal behavior.

5. Entertainment

Link9to5Mac on LinkedIn Scraping Explanation: Some individuals engage in cybercrime for entertainment or thrill-seeking. While this motive is less common than financial gain, it highlights a reckless or playful attitude towards technology.

6. Boredom

LinkHerald Live on Cyberbullying Explanation: Boredom can lead individuals, especially young ones, to engage in risky online behaviors. However, this motive feels less significant compared to the others, as it lacks the urgency of financial or emotional motives.

7. Multiple Reasons

LinkInfosecurity Magazine on Hackers Explanation: While many hackers may have multiple motives, this lack of a singular focus makes it harder to understand their actions. It can complicate the narrative around cybercrime, making it less impactful as a standalone motive.

Journal Entry #6

  1. Fake: “PayPal Secure Login” (paypal-secure-login.com)
  • Real: PayPal (paypal.com)
  • What makes it fake: The URL is slightly altered, often using hyphens or misspellings. Fake sites typically lack the SSL certificate (look for “https://”).
  1. Fake: “Amazon Customer Support” (amazon-customerservice.com)
  • Real: Amazon (amazon.com)
  • What makes it fake: Scammers often create fake customer service sites with unprofessional design and poor grammar. Real sites have consistent branding and clear contact information.
  1. Fake: “Bank of America Verification” (bankofamerica-verification.com)
  • Real: Bank of America (bankofamerica.com)
  • What makes it fake: Phishing sites often create a sense of urgency (e.g., “verify your account now”) and use generic greetings. Real sites use personalized communication and secure login processes.

Always verify URLs and look for official branding to avoid falling for scams.

journal entry #7

1. Photo of a person looking confused at a computer (Photo 1)

Meme Text: “When you thought you could just ‘ignore’ that software update…” Explanation: This meme highlights the common human tendency to overlook important cybersecurity practices, like software updates, due to confusion or procrastination. In human-centered cybersecurity, understanding user behavior and addressing their anxieties or misunderstandings is crucial for fostering better security practices.

2. Photo of a group working together (Photo 2)

Meme Text: “When you realize teamwork is key to cyber safety: ‘I’ve got your back!'” Explanation: This meme emphasizes the importance of collaboration and communication in maintaining cybersecurity. It reflects the human-centered approach by illustrating that a supportive community can empower individuals to share knowledge and best practices, ultimately enhancing security for everyone.

3. Photo of a person with a phone in hand (Photo 3)

Meme Text: “That moment you realize your ‘secure’ Wi-Fi is actually public… #Oops” Explanation: This meme captures the often-overlooked risks associated with mobile device use and public networks. It speaks to the human-centered cybersecurity principle of making users aware of their surroundings and the potential vulnerabilities that can arise from seemingly innocuous situations.

Relation to Human-Centered Cybersecurity

These memes reflect key aspects of human-centered cybersecurity by focusing on user behavior, awareness, and community support. They remind us that cybersecurity isn’t just about technology but also about understanding the human elements involved—emphasizing education, collaboration, and the need for clear communication to navigate the complexities of digital safety. By addressing the human side, we can create more effective and inclusive cybersecurity strategies.

journal Entry #8

After watching the video analyzing various hacking scenes in movies and TV shows, it’s clear that media significantly distorts our understanding of cybersecurity. Often, hackers are portrayed as genius loners who can break into complex systems in mere seconds, using flashy graphics and unrealistic interfaces. This dramatization not only sensationalizes hacking but also fosters misconceptions about the actual skills and time required in cybersecurity work.

In reality, effective hacking requires meticulous planning, knowledge of systems, and often teamwork, rather than the lone-wolf stereotype seen on screen. This portrayal can lead to a lack of understanding about the importance of cybersecurity and the threats we face. Overall, while entertaining, these depictions can misinform the public and downplay the seriousness of real-world cyber threats.

journal entry #9

My Response to the Social Media Disorder Scale

  1. My Score:
  • I scored 20, which shows that I have a moderate level of social media use.
  1. Thoughts on the Items:
  • The questions made me think about how much I check my social media and how it affects my life. Some items, like feeling anxious when I can’t check my phone, really hit home. I realized that I sometimes let social media take up too much of my time.
  1. Different Patterns Worldwide:
  • I think people use social media differently around the world because of a few reasons:
    • Culture: Some cultures use social media more for communication and connection.
    • Access: In countries with better internet access, people are more likely to be active online.
    • Age Groups: Younger people often use social media more than older generations, which can change overall patterns.

Final Thoughts

This scale helped me see how social media can affect my daily life, and I want to be more aware of my habits moving forward.

Journal Entry #10

Journal Entry: Reflections on Social Cybersecurity

I read an article on social cybersecurity today, which highlights how digital tools are now used to manipulate human behavior and fracture societies—a shift from traditional cybersecurity focused on defending technology. The article discusses how information warfare, like Russia’s use of disinformation, aims to weaken trust in institutions and divide populations, creating vulnerabilities before any physical conflict occurs.

This approach, called cognitive hacking, stresses the need for the U.S. military to adapt by protecting not just networks, but social cohesion itself. The article made me realize that in the digital age, safeguarding public trust and countering disinformation are just as critical as traditional defense measures.

Journal Entry #11

in a cybersecurity analyst role, much of the focus is on understanding and responding to human actions—both the behaviors of potential attackers and the vulnerabilities in users’ interactions with technology. A common social theme is trust, as cybersecurity analysts are tasked with protecting sensitive information, requiring them to build trust within an organization. Social engineering also plays a significant role, as attackers often manipulate human psychology to gain access to secure systems. The video might emphasize how understanding social dynamics, such as human errormisinformation, and psychological manipulation, is essential for both detecting threats and educating others about cyber hygiene.

Journal Entry 12

Economic Theories:

  1. Principal-Agent Theory:
  • This theory explains the relationship between a company (the principal) and its platform provider (the agent). The breach occurred due to the platform provider’s failure to secure systems. The company relied on the provider to protect customer data, but their oversight was insufficient, leading to the breach.
  1. Externality Theory:
  • The breach represents a negative externality, affecting not only the company (reputation and financial costs) but also customers (potential identity theft). It shows how a failure in security can have wider economic impacts, lowering consumer confidence in online transactions.

Social Science Theories:

  1. Social Contract Theory:
  • Customers trust the company to protect their data, and the breach violates this implicit agreement. The company’s response—informing customers and advising protective steps—aims to restore trust and fulfill its responsibility under this social contract.
  1. Cultural Theory of Risk:
  • Different social groups perceive the risk of identity theft differently. Younger, tech-savvy customers may react quickly to secure their information, while older or less informed customers may be more vulnerable and anxious, showing how cultural factors shape risk responses.

Week 11 – Journal Entry 13

This article explores the role of vulnerability disclosure policies (VDPs) and bug bounty programs in improving cybersecurity. The literature review highlights the lack of VDPs in many firms, which discourages security researchers from reporting vulnerabilities due to liability concerns. However, attitudes are changing, with governments encouraging companies to adopt these policies. The literature also notes the growing popularity of bug bounty programs, but there has been limited empirical research on their effectiveness.

The study’s findings provide valuable insights:

  1. Hackers are price-insensitive: This means even companies with limited resources can benefit from bug bounties.
  2. Company size and profile don’t significantly impact reports: Smaller companies can gain just as much from bug bounties as larger ones.
  3. Industry differences: Finance, retail, and healthcare sectors receive fewer vulnerability reports.
  4. Maturity of programs: Older programs receive fewer reports, though expanding the scope can help.
  5. New programs don’t impact report numbers: The launch of new programs does not significantly affect the volume of reports.

While these findings are important, the study also acknowledges limitations, such as the inability to account for report severity and the lack of data on certain industries. Overall, the article advances our understanding of bug bounty programs, demonstrating their value for large and small companies and highlighting areas for future research.

Journal Entry 14

Andriy Slynchuk describes several things people do on the internet that can be illegal. Here are five of the most serious ones:

  1. Copyright Infringement: This happens when people download or share music, movies, games, or software without paying for them or getting permission. It’s a serious crime because it takes money away from the people who created those things, like musicians or movie makers.
  2. Identity Theft: This is when someone steals another person’s personal information, like their credit card number or Social Security number, and uses it for themselves. It’s a huge problem because it can mess up the victim’s finances and cause a lot of stress.
  3. Hacking and Unauthorized Access: Hacking is when someone breaks into a computer system or network without permission. They might steal sensitive information or cause damage. This is dangerous because it can lead to stolen personal data, financial loss, or even shut down important systems.
  4. Cyberbullying and Harassment: Using the internet to bully or harass someone can lead to emotional harm. This is serious because it can cause long-term damage to a person’s mental health, and the person doing it can get in trouble with the law.
  5. Phishing and Scams: Phishing is when scammers trick people into giving up their personal info, like passwords or bank details, usually by pretending to be someone trustworthy. This can lead to financial loss for the victim and is part of a bigger problem with online crime.

These violations are serious because they can cause real harm to people, whether it’s stealing money, hurting someone’s reputation, or breaking the law in other ways. The consequences can damage the victims and those who commit these crimes.

Journal Entry 15

Today, I watched a TEDx talk by Davin Teo about his journey into digital forensics, and it got me thinking about how this field connects with the social sciences. Teo shared how his early interest in technology led him to digital forensics, but what stood out was his focus on understanding human behavior through digital evidence. He emphasized that digital forensics isn’t just about recovering data—it’s about interpreting human actions, which requires critical thinking and an understanding of psychology and social context.

Teo’s career pathway was non-linear, much like many social science careers, which often evolve through experience and education. His work also involves ethics and privacy, areas deeply tied to sociology and law. Digital forensics isn’t just technical work; it requires a balance of technical skills and a human-centered approach to solve problems and ensure justice.

Teo’s story shows that digital forensics, like the social sciences, is about understanding people and society. It made me realize that this field blends technology with a deep understanding of human behavior and ethics, highlighting the important connection between tech careers and the social sciences.

Leave a Reply

Your email address will not be published. Required fields are marked *