Cybersecurity 201s
Article 2
Article 1
Career paper
Journal Entrys
Week 1 – Journal Entry
The NICE framework allows for many paths in cybersecurity to be taken. What intrigues me to the Protect and defend and investigations categories. Protect and defend appeals to me because it involves identifying and minimizing threats, which is impactful. Investigation is just as intriguing, as it focuses on analyzing digital evidence to solve cybercrimes a field that blends technical skills with problem solving. Oversight and Governance is my least interest as this leans more on high level management and planning as opposed to hands on as im more confident in retaining information when it is hands one. In conclusion the framework helps how a clear structure for exploring more avenues for cybersecurity and im happy to learn more about opportunities in areas that protect systems and uncover dangers.
Week 2 – Journal Entry 2
the principles of science, empiricism, determinism, parsimony and objectivity are crucial to effective cybersecurity. Empiricism focuses on evidence based procedures and guiding decisions using data from security breaches or threat patterns. Determinism underlines that cyber incidents use cause and effect, this enables proactive threat prevention. Parsimony ensures simplicity in system design, reducing overcomplication and vulnerabilities. Objectivity offers unbiased data and decision making that prioritizes facts over assumptions when talking about risks. All together these principles create a structured and logical approach. Enhancing both systems resilience and adaptability to evolving threats to secure digital assets. This way of doing thinfs ensures cybersecurity strategies remain robust and reliable
Week 3 – Journal Entry 3
Researchers utilize publicly available data breach information from PrivacyRights.org to analyze trends, identify security weaknesses, and develop preventative measures. By studying the causes of breaches, the impact on industries, and exposed data types, they can recognize recurring threats and evaluate responses. This information helps evaluate the effectiveness of security policies and regulations over time. Assessing past breaches helps create strategies to mitigate future risk, and strengthen cybersecurity and effectiveness of security over time, as well the data allows for studying of breach patterns across all areas and can help identify common weak points. understanding breach trends helps in raising awareness of the importance of data protection and therefore adopting the best practices in cyber security.
Week 4 – Journal Entry 4
Technology plays a key role in meeting and fulfilling our everyday needs. We used apps to order important items such as food or track health and fitness for basic necessities. Safety is a vital element of technology as antivirus software and passwords are important to ensuring technology’s safety. Technology helps us branch our lives by a lot by allowing us to upload our resumes and accomplishments for anyone in the world to see as well as stay connected with those close to us from anywhere in the world. Lastly, it helps us learn new skills and express ourselves in many ways. Technology helps fulfill each level of Maslows Hierarchy, making life easier and more connected
Week 5 – Journal Entry 5
1.) for money makes the most sense as financial gain is a common driving motive behind cybercrimes such as fraud and hacking
2.) revenge is a strong motive as this can be in cases such as cyber bullying where one may seek to harm others out of personal vendettas
3.)recognition can be a driver as gaining a big reputation gains fame and acknowledgment from others
4.) Many offenders engage in cyber crime for joy or curiosity to see what they can achieve and get away with.
5.)political motives can be a common reason but seem more of a smaller crowd as opposed to what most other motivators are
6.) boredom can be one reason but is not as strong in its reason to go out of ones way to commit crimes
7.) while offender may have mixed motives the sheer complexity of these reason are hard to pin point and find a conclusion
Week 6 – Journal Entry 6
Identifying fake websites is crucial to protecting personal information as counterfeit websites often use fake URL’s impersonating legitimate websites such as apple as they offer unrealistic discounts and promise up to 90% off products which is not common on the official website. media websites often have fake counterfeits such cbssSports.com instead of cbssports.com and spread misinformation to deceive readers. To spot these fakes, Scrutinize the URL for misspellings or extra characters or false advertising such as promises of high discounts. Looking for discrepancies or uncommon characteristics that professional websites would have because often you can tell by looking. Its important to verify a websites legitimacy before giving away your information.
Week 7 – Journal Entry 7
For photo 2, I chose to write a meme for it saying ” trying to explain to your team why not using “Password123″ is more important than actual cybersecurity,” as this emphasizes the importance of good practice in creating strong and unique passwords to prevent easy access against criminals. Next is photo 12 for this it would be “Me convincing myself not to click the email titled “You won a free iPhone 16!! Claim your prize!!” as these emails usually have links that lead to malware being placed on your computer and leading to information being stolen. Photo 13 gives the meme of ” how it feels using my computer in a public space” Often many users feel scared or nervous their internet activity is being watched and or could be seen by anyone and lead to harmful actions or activities.
Week 8 – Journal Entry 8
The media has a big influence in how we as the audience view cybersecurity. Media often distorts or exaggerates things for the sake of entertainment such as hackers having incredible sense of ease when hacking and being able to break into any system. This depiction exaggerates and glamorizes hacking and shows a misconception for cybersecurity. In reality cybersecurity is time consuming, rigorous time and effort to protect systems from sophisticated threats. the dramatized portrayal of hackers as lone wolves also ignores teamwork. This overall creates unrealistic expectations that it is easy creates a false look for both hackers and cybersecurity specialists further complicating the understanding of this field.
Week 10 – Journal Entry 9
I scored 3 yes’s and was indicated as risky usage. I think that the items on the scale don’t relate to my use of social media that much because i mainly use it for entertainment as opposed to myself posting on it so i find it hard to relate to the questions but there are those whose lives revolve or are heavily influenced whether that be follower counts to likes on their posts. Social media patterns around the globe vary from a lot of factors such as culture and technological differences. In more developed areas it can be used for work and communicates and others its more entertainment focused. Technology access plays a role in patterns.
Week 11 – Journal Entry 10
This article emphasized the importance of social cybersecurity in the new age of technology. It focuses on how attacks have been growing rapidly using social engineering and exploiting human behavior and societal issues such as misinformation. Unlike tradition cybersecurity, which mostly consisted of protection against technological threats, social cybersecurity addresses tactics that manipulate people. The article supports comprehensive approaches, mixing technology with ideas that tackles social aspects of cyber risks. It also emphasized the need for awareness against this to be spread to the public, digital literacy and policies that carefully balance privacy and security as technology only continues to evolve.
Week 11 – Journal Entry 11
This video discusses several themes relating to the role of a cybersecurity analyst. One them was communication as analysts must break down and explain complex issues in a manner that is easy to those not versed in the world of cybersecurity. Another them is collaboration as analysts work with many different departments to implement security measures and respond to threats. This video also emphasized the human element in cybersecurity, more leaning towards preventing social engineering attacks. Analysts play a vital role in spreading awareness and training and helping employees recognize these tactics and avoid possible security risks. Overall the job not only technical skills but strong communication.
Week 12 – Journal Entry 12
This breach letter highlighted how data breach affects both businesses and their customers. In economic terms, cost-benefit analysis helps businesses with the value of cybersecurity investments against the potential loss financially that could occur from a breach. Another relevant theory is opportunity cost, which reflects how money spent on recovery could have been used for more opportunities that could offer growth. From a social sciences perspective, trust theory explains how breaches erode customer trust. As well the risk perception theory shows how businesses often underestimate potential threats, which can lead to big consequences. These highlight the wide impact of failures in cybersecurity.
Week 12 – Journal Entry 13
the article on bug bounty policies explains how these programs are becoming more and more popular and cost-effective strategies for Improving cybersecurity. The literature review discusses how ethical hackers are paid and incentivized to find system vulnerabilities before they can be exploited by malicious actors, therefore saving businesses the higher costs of responding to a data breach. The findings show that the success of these programs relies on setting the right incentives for participants and ensuring enough skilled hackers are involved. Bug bounty programs when managed well, offer a cost-efficient method to reduce cybersecurity risks and prevent potential cost attacks
Week 13 – Journal Entry 14
1.) Using unofficial streaming services is a big one for me as accessing movies, shows and or music through illegal websites is a huge risk to not only your device but you yourself as data can be stolen fast and legal consequences if you are caught.
2.)Sharing personal information without consent which is known as doxing can be extremely dangerous as someone’s address is exposed and other things such as photos and passwords online can be seen without their permission which can lead to harassment and stalking.
3.) Recording VoIP calls as recording voice or video call privately with the other party unaware is illegal and violates privacy rights
4.) Using other peoples networks is a bad one using another persons WIFI is a clear violation of their privacy and can be lead to legal consequences.
5.) Impersonating someone online is a bad one is can be defamation and can lead to serious issues such as fraud and or other serious legal issues.
Week 15 – Journal Entry 15
watching Davin Teo’s Ted talk on digital forensics, his career path i found to be interconnected with social sciences. Teo emphasized that digital forensics investigators must understand on a deep level of human behavior and motivations on a psychological level behind the crimes committed and finding the significance of social sciences. His journey shows a multidisciplinary approach, incorporating technical cybersecurity skills with a view in social behaviors. I really enjoyed his emphasis on continuous learning and adaptability, critical elements shared by social sciences from rapid changing technology’s. Teo’s narrative effectively showcases the importance of integrating social science perspectives with tech knowledge which is crucial for highlighting modern digital crimes.