Journal Entries

Journal week 1

by ajone236 on January 20, 2025 in Uncategorized • 0 Comments

The NICE Workforce Framework is all about various careers in cybersecurity which means protecting computers and information. Some jobs that might be interesting are, Collect and Operate which is gathering information to help protect systems from attacks and Investigate which involves enquiring into cyberattacks or security incidents to identify causes and measures against them. Perhaps the least exciting position is Security Software Developer as the work is mostly coded, often requiring instant decisions, which can be hard for some individuals. As such, problem solving or responding to emergent situations in the quickest ways would be the most enjoyable jobs!

Journal week 2

by ajone236 on January 23, 2025 in Uncategorized • 0 Comments

The scientific method of observation testing and data evaluation provides the foundation for successful cybersecurity efforts. The same research methods apply to cybersecurity because security teams must study network behavior to find risks. In ethical hacking users test systems to find weaknesses exactly like scientists test their theories. Cybersecurity experts use real-life evidence collected from network actions and intrusion activities to build their risk and defense theory. Scientists and engineers use research methods to develop better security defenses in cyber safety solutions throughout steady improvement cycles. Security professionals need to analyze new information like scientists update their research findings. Experts from both fields use structured research methods to solve problems and enhance their understanding of security systems.

Journal Entry 3

by ajone236 on February 3, 2025 in Uncategorized • 0 Comments

The accessible data found on PrivacyRights.org enables researchers to study data breach characteristics as well as their historical patterns. PrivacyRights.org collects details from data breaches that show both the extent of each incident as well as which records were compromised and what types of protected information was revealed together with the organizations responsible. Analyzing the data provided by PrivacyRights.org enables researchers to uncover regularities and system weaknesses between different sectors which guides them toward identifying security improvement zones. Researchers conduct studies about breach occurrences to determine which periods including holidays and system update times lead to more frequent incidents. The collected data aids in establishing scientific knowledge regarding response strategy performance and legal framework effectiveness in addition to showing the economic and social consequences on affected people and businesses.

Journal Entry 4

by ajone236 on February 6, 2025 in Uncategorized • 0 Comments

Human needs get satisfied by technology according to Maslow’s Hierarchy of Needs. Indispensable technical services including food delivery applications and health monitoring applications sustain my daily practical requirements at the physical level. I maintain both personal data safety and financial security through protected online banking services along with privacy features and dual authentications. Social media and messaging applications enable me to preserve connections with loved ones using these platforms so I can keep nurtured relationships as well as participate in social communities. Through LinkedIn I am able to demonstrate professional achievements which improves my self-esteem because of recognition and review feedback. The combination of online courses with creative software and personal blogs from online platforms aid my pursuit of learning and self-improvement for achieving my complete potential. Technology improves all aspects of my needs as it strengthens my development at both personal and professional levels.

Journal Entry 5

by ajone236 on February 15, 2025 in Uncategorized • 0 Comments

For Money (Rank 1)
Financial gain stands as the basic and most popular reason that drives individuals to engage in cybercrimes. The direct extraction of funds through theft and fraud together with extortion drives these cybercriminals to their profitable ends.

Revenge (Rank 2)
The intense emotional drive to seek revenge establishes itself as a frequent cause which motivates criminal activities especially within cybercrime domains including hacking methods and practices of doxxing and distribution of non-consensual explicit content. Such feelings are natural since almost everyone has endured some form of injury in their lifetime.

Political (Rank 3)
The practice of hacktivism for political aims continues to rise as people select it as their preferred form of protest. Participating in cybercrimes through hacking allows those with political beliefs to create disruptions against systems and make their points visible. The situation fits logically into attempts by people to drive societal transformations.

Recognition (Rank 4)
In technical groups and among younger members motivation based on seeking validation plays a major force. Understanding this motivation makes sense but it falls behind concrete motivations which include money and revenge.

Entertainment (Rank 5)
The practice of cybercrime for thrilling fun seems possible although it happens less frequently than when people engage in such behavior out of necessity or anger. Cyberspace crimes conducted by such people typically involve skills testing and achieving feelings of power from creating confusion although this motivation feels less significant than other factors.

Boredom (Rank 6)
The condition of being bored leads some individuals to act on impulse by doing damage through their online activities. Additionally it becomes challenging to support boredom as a fundamental reason for online crimes unless someone examines more forceful emotions like revenge or financial necessity. Boredom appears unintentional and purposeful in nature.

Multiple Reasons (Rank 7)
Multiple factors may impact a person’s motives but “multiple reasons” stands as the least defined category in this context. Multiple reasons for criminal intent create an indistinct target analysis which complicates the identification of single motivating factors and fails to establish clear logical reasons for cybercrime participation.

Journal Entry 6

by ajone236 on February 21, 2025 in Uncategorized • 0 Comments

I’ve identified additional three fake website cases alongside their true counterparts. 

Users are drawn in by “www.ebay-deals.com” which represents a fake eBay website that promotes suspicious discount offers on common products. Such unauthorized websites duplicate eBay’s layout while demanding additional personal details like credit card information to “process the transaction.” Users can trust the authentic eBay website because it maintains a secure platform that displays payment methods and comprehensive product information to protect users against fraud attempts. 

Users need to be aware of fake Apple support websites including “www.apple-supportonline.com.” Such scams fraudulently advertise customer assistance services while forcing users to download destructive software as well as request access to private information. Users can access official Apple support through their real website since they offer secure customer service tools without any unexpected requests for personal details.

An example of fake deception occurs at “www.adobe-downloads.com” which tries to mislead users into installing harmful code that costs money for Adobe software available without charge in the official platform. Real customers can find verified safe downloads on the official Adobe site which shows transparent subscription and secure payment options. The warning signs of a scam include shoddy website design combined with weak encryption and surprising deals that probably signal a fraud. 

The prevention of fake websites involves users to verify website addresses while ensuring HTTPS encryption is present along with skepticism toward blindly accepted promotions.

Journal Entry 7

by ajone236 on March 3, 2025 in Uncategorized • 0 Comments

This meme humorously highlights inefficiencies in workplace communication, which directly relate to Human Systems Integration (HSI). HSI focuses on optimizing interactions between people, technology, and organizational processes to improve productivity and reduce unnecessary workload. The image depicts a long meeting with disengaged participants, suggesting that the content could have been conveyed more efficiently via email. This aligns with the HSI principle of workload management, which emphasizes streamlining information flow to prevent cognitive overload and wasted time. Additionally, the image underscores the importance of human-centered design in workplace processes that ensuring that meetings, tools, and communication methods are structured in a way that maximizes efficiency and minimizes frustration. By applying HSI principles, organizations can determine when meetings are truly necessary and when alternative communication methods, such as emails or collaborative digital platforms, might be more effective. This enhances productivity, employee satisfaction, and overall system performance.

Journal Entry 8

by ajone236 on March 8, 2025 in Uncategorized • 0 Comments

“Hacker Rates 12 Hacking Scenes in Movies & TV” provided insights into the inaccurate ways hacking appears on entertainment media. The entertainment industry demonstrates hacking through rapid keyboard typing which immediately leads hackers to breach firewalls and obtain confidential classified data. The excessive representation of cybersecurity incorrectly presents how the practice operates in real-life activities. Real hacking operations demand extensive work and take several hours to complete. Technical expertise teamed with long-term commitment and social engineering knowledge because coding alone is usually insufficient for the process. The presentation demonstrated how numerous hacking scenes overlook actual cybersecurity standards so they present simple computer-based breaches of secure systems. The outcome gives birth to incorrect perceptions about real cyber dangers while also creating an inaccurate assumption about how quickly cybersecurity experts solve security issues. The media features hacking and cybersecurity to the general public but provides insufficient education regarding practical password security and software update practices and the understanding of phishing attacks. The video served as a warning to question hacking scenes in movies and television while encouraging viewers to receive reliable sources of information about cybersecurity.

Journal Entry 9

by ajone236 on March 17, 2025 in Uncategorized • 0 Comments

The scale components use, allow the identification of behavioral addiction-related symptoms such as maintaining addictive behavior under control and concealing usage-related information and social media behavior as a method for emotional stress relief. The assessment tool successfully pins down possible problems but provides no indication of whether users are deeply addicted or simply intense users. Individuals who rely on social media for business purposes along with networking activities can achieve high scores yet remain free from damaging effects. The scale fails to evaluate any beneficial elements of social media use including distance friendship maintenance and community support networks. Social media disorder follows different patterns in various regions because different geographical areas experience varying levels of technology usage together with diverse social standards. Social media plays a fundamental role in daily existence within tightly connected societies which facilitates the development of media overuse among its residents. The extent of internet availability together with official digital policies sets the boundary for how much social media overuse occurs. The fundamental beliefs of a culture guide individual conduct as individualistic nations support separate electronic communication whereas collective nations support face-to-face interpersonal connections. The mental health awareness and stigma toward social media addiction play an influential role because some regions fail to recognize this condition as real. Although social media offers advantages you need to monitor its usage because careless use might harm your daily responsibilities and interactions with people.

Journal Entry 10

by ajone236 on March 28, 2025 in Uncategorized • 0 Comments

Through a study by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley the authors analyze how social media along with digital platforms serve as platforms for waging misinformation campaigns as well as disinformation campaigns and influence tactics. The article shows how hostile forces use social network environments to reshape public sentiment while making communities unstable while threatening national defense capabilities. The article supports traditional cybersecurity measures as inadequate to fight modern threats because it calls for combined knowledge frameworks between cybersecurity experts and social scientists working alongside AI professionals. The article presents social cybersecurity as an approach which extends beyond data and network protection to defend public image while maintaining trust among people. The concepts presented in cognitive security about human information processing and behavioral responses made a strong impression because they demonstrate how false information reshapes community reactions. The authors support better detection techniques alongside education efforts for public defense strategies to prevent these security threats.
The article provided me greater insight that cybersecurity extends beyond technological prerequisites by integrating with social network interactions. The development of strategies to bolster digital influence operation resistance needs interaction between policymakers along with researchers and technologists.

Journal Entry 11

by ajone236 on March 28, 2025 in Uncategorized • 0 Comments

The video of Nicole Enesse explains that cybersecurity analysts function within a social environment because human behaviors remain essential factors. The video main focus explores security analyst relationships with non-technical staff members because adequate training and communication remain vital for stopping breaches due to personnel mistakes. These attacks target people who trust others leading to phishing incidents because user awareness stands as the main defense against this tactic. Reliable cybersecurity protection depends on analysts who must work together with different departments to keep policies and maintain compliance regulations according to the video presentation. The concept of cybersecurity extends beyond technological measures because it involves behavioral modification and establishing security-oriented cultural standards.

Journal Entry 12

by ajone236 on April 4, 2025 in Uncategorized • 0 Comments

Two economic theories explain the analysis of the data breach letter. Cost-Benefit Analysis (CBA) enables the company to make the decision to warn its customers about the breach because the possible long-term costs outweigh immediate notification costs even though misuse is unconfirmed. Providing notification to customers allows the company to prevent long-term expenses from increasing because of reputation harm and customer loss even though it requires short-term expenses for both communication and recovery tasks. The Market Failure Theory shows how the company’s data protection system operated inadequately thus causing customer harm. The company implements these customer support services and notifications to address market failure while building customer trust. The relationship between the company and its customers faces detrimental impacts because of the breach according to Trust Theory in social sciences. These measures aim to both restore vital customer trust because losing this trust would lead to reduced customers and decreased business operations. Modern society deals with expanding perils including technological risks through the Risk Society Theory which Ulrich Beck developed. These risks materialized in the breach of data which the company successfully managed by responding to consumer protection needs in our digital society.

Journal Entry 13

by ajone236 on April 4, 2025 in Uncategorized • 0 Comments

This paper analyzes bug bounty programs through data from HackerOne to build an economic model describing their operating efficiency. Research in the article traces bug bounty program historical development while demonstrating how these programs connect corporate entities to ethical hackers. The programs enable organizations to detect weaknesses through economic compensation of hackers who align their financial objectives. The article presents research to show that payment programs shape both the number of reported vulnerabilities and their overall quality during discussion. Through the economic framework organizations can find the right reward structure to stimulate expert hacking activities while avoiding expenses beyond their reasonable limit. The research confirms the requirement to maintain incentive equilibrium for achieving program success. The article proves that bug bounty programs represent both powerful cybersecurity tools and modern economic incentive alignment strategies which help companies and ethical hackers succeed in the digital era.

Journal Entry 14

by ajone236 on April 7, 2025 in Uncategorized • 0 Comments

This article identifies 11 unknowing internet activities that violate legal codes on the web. The most serious illegal activities online include content piracy of music movies and software because they violate copyright laws and might result in substantial fines or legal action. Online identity fraud constitutes a serious violation that might result in theft and fraud charges. Illegal consequences result from distributing personal information that belongs to someone else because sharing it without consent violates privacy laws. Hacking into accounts or systems for any reason including curiosity and even for fun activities is considered a punishable criminal offense that may result in imprisonment. Using a different person’s Wi-Fi network without consent amounts to theft which might result in legal fines or criminal prosecution based on the particular scenario. The violations of privacy represent a major threat to trust because they both violate human rights and create extended legal and personal penalties.

Journal Entry 15

by ajone236 on April 23, 2025 in Uncategorized • 0 Comments

Digital forensics professional Davin Teo demonstrates that this career field remains strongly connected to the social sciences discipline. His fascination with technology started from being interested in hacking yet his current work demands profound expertise about human behaviors and human motivations alongside social patterns. Digital forensics proves to be more extensive than basic data collection because it entails reconstructing stories through digital evidence and understanding human conduct from digital sources. Expertise in technology alone is inadequate for this field since developing insights into social human technology interaction requires both psychological and social awareness skills. The understanding of social science plays an essential role in digital forensics because investigators must evaluate the behavioral and decision-making patterns of people from particular social settings. The proper interpretation of data requires complete understanding of the contextual environments according to Teo. The existence of technology exists because human beings use it thereby requiring society-related investigations to fully comprehend digital crimes. The path Teo took shows how digital forensics unites technical competence with abilities to understand human psychological and social media usage elements thus creating an exciting science-law-psychology combination.