Journal Entries

JOURNAL ENTRIES

Journal Entry #1

I’ll start off by going over my least area of  the Cyber Security field position. Not to say that I would never want a job in this field or that I can’t see myself doing Oversight and Governance  in the future, It’s just the facts that being a student, studying the field of Cyber Security and just now getting my feet wet/ introduced to the jobs, as of right now I wouldn’t be ready or prepared for a role like OverSight and Governance. Oversight and Governance involves a lot of Leadership, Leading management roles, and planning leadership. As a student who is just now getting into Cyber Security it can seem like a lot. With that being said, in the future after I get more knowledge about the system and get to know about the majority of the fields, without a doubt CyberSecurity WorkForce Management will be in my interest. 

For what I found to be the most interesting field that I read about was Protection and Defense. I chose this field  because it involves a lot of protection for technology, systems, networks and even crime related jobs. A job like Defense Cyber Security is what I’m interested in. It’s responsible for analyzing data for defense in order to protect possible risk. That’s a field that I’m highly into right now.  

Journal Entry #2

The Principle of science and cyber security are both very much related in many ways. Cyber security is a sub field of computer science, science is in Cyber security you have to learn methods and find traffic in a network just like in science. They both involve a structured approach to analyzing threats and in a way testing hypotheses.  It’s all figuring out testing, observations, and data collecting. Evidence and methodologies are main staples that make science and cyber security alike. It’s problem solving, evacuating various outcomes, and constantly improving. Science is used and is informal to create, better, and expand cyber security.

Journal Entry #3

How might researchers use this information to study breaches?, There are many ways from reading this article that could help Researchers understand the different types of breaches, and use it to help them in many ways. Researchers can use this information given to study breaches as a tool in a way. It can help the researchers learn relevant information, numbers of records that could be exposed in breaches, and things like the type of organization and relevant date information. Not only can Data breach be a designed tool in a way to help researchers, but it can also help journalists, policymakers, and even advocates. 

Journal Entry #4

physiological needs: This level can relate with my experience to technology, it relates to me because physiological needs is the need to have your phone on you at all times. Needing internet, electricity, computer, and phone access to technology due to my everyday life. In modern day society these things are a need and are important.

safety needs: I have multiple experience with technology at this level. From having a security ring camera at home, cloud /storage backups on my smartphone, passwords and other things like that make sure my information on my smartphone is secure.

Belongingness and love needs: I relate to this, and have had several experiences at this level by engaging in communications with my friends, family, classmates, and even relationships through technology over messages, phone calls and video calls.

Esteem needs: have had experience through technology with this level. I started accounts like youtube, Instagram, or even snap chat and have showcased some of my achievements. I’ve even started a hudul account so that way I can showcase some of my highlights to college football scouts.  

Self actualization: I’ve done this and I Am currently doing this level and having some experience with it through technology.  one of the examples that I’ve done is music production. it contributes to society in a way and is a passionate skill that I’ve picked up on. 

Journal Entry #5

1-money. I say money is number one because This is without a doubt the most common factor/ motive of cyber crime, which is financial gain. 

2-revenge. I say revenge at number two because  most people do things in spite of others, and feel like they want to take from others

3-political. I say political is three because it can be driven/aimed towards the government, people who don’t agree with political outcomes and wants to attack the government

4-entertainment. I say entertainment at four because these cyber crimes can be committed simply because someone does it for fun, excitement, satisfaction, and just simply entertainment for themselves. 

5-multiple reasons. I say multiple reasons at five, because it can be anything. It can be all of these 6 motives

6-boredom. I say boredom at 6, because just like entertainment, I feel as if someone can make these crimes to keep them satisfied and entertained. 

7-recognition. Lastly, I said recognition. The reason why I chose recognition last is because most cyber crimes aren’t necessarily done for attention. Most hackers or cyber criminals don’t want the crime to be recognized. 

Journal Entry #6

1: Fake website- www.secure-banklogin.com

   Real website: www.chase.com

The fake website just looks suspicious, no name for the bank you’re logging in to it just says bank log in, and the word “secure-” is typically used on fake websites. with www.chase.com its short, uses a bank name. 

2: fake website- www.amazon-deals-now.net

  real website- www.amazon.com

The fake website uses too many words instead of .com or .net, while www.amazon.com is clearly recognizable and official. the fake website probably even gives you abnormal drastic discounts that’s just too good to be authentic. or even give you a time limit so you can hurry up and put all your information on the website.

3: fake website- www.microsoftupdates-seurity.net

real website- www.microsoft.com

Fake website too many words, heard the website asked people to constantly download security updates or many other files that could lead to viruses or hacking. The real website doesn’t do that. and the brand is official. 

Journal Entry #7 (Image poster) (shared link for that poster)

Journal Entry 7 poster

Journal Entry #8 

N/A

Journal Entry #9

After completing the social media Disorder scale, I feel as if I scored pretty well. 7/9 No’s. For me social media isn’t a judge factor in my life, as though I do be on social media for a couple hours a day on my phone, I feel as if everyone does. 

I think the items on the scale can be used to grade a social media disorder very well and accurately. 

I think the different patterns across the world are found, because social media does play a huge factor in most people’s lives in this generation. I also feel as though these found patterns can be used to help prevent those disorders that come with social media and used to help others. 

Journal Entry #10

In this article , “Social Cyber security An Emerging National Security Requirement” I feel as if it pretty much dives into the military perspective on Cyber security and Cyber security is important and different ways that the military uses their national defense in order to protect against attacks, and cyber threats. It also shows the importance of the military and the government and how the training they provide helps the awareness of defending cyber threats. Another main statement that was made in this article was the importance of the needs of education, things like social engineering and different cyber security fields can influence cyber vulnerabilities/ attacks. 

Journal Entry #11

The description in this video of the cyber security analyst job is related to social behaviors in many ways. In this video it talks about social behaviors and how most of the jobs were technology based and reflecting on things like how to analyze data, networks, and understanding how to manage human behavior. What I took from this video is that it’s educating employees in these jobs to learn cyber security and learning security awareness and even the different measures on how to be safe online. It was an introspective on how cyber security can also be physical and humanized in a way that is just as equivalent and held to a standard like technology. Dealing with human behavior. 

Journal Entry #12

The two Different economic theories that can relate to this theory are the Information asymmetry and moral hazard theory. Information is when an attacker/hacker has more knowledge about the security vulnerabilities than an organization. Moral Hazard theory is when an organization or an individual takes a certain security risk so that they don’t

face a risk of potential breach. These two economic theories that can relate to the letter because they show that failure to hide important information can cause problems for consumers and reduce market efficiency. 

The two different social sciences theories related to the letter are the social trust and risk society theory. Social trust theory is trusting others with important information, sensitive data, and sharing information.  Risk society theory shows that modern societies are building the awareness of cyber risk and management in cyber risk. It points to managing and mitigating risk. These  two different social sciences theories are related to the letter because it shows the trust in customers and company’s, they also show the increase in how important it is for a breach to manage technology risk. 

Journal Entry #13 

In this article it dived in on bug bounty programs and the economic efficiency of these programs. The literature review was about the programs and how they reward hackers for discovering vulnerabilities. These programs I feel use these practices to not only pay hackers that can help identify some of the vulnerabilities, but they use these helpful practices to improve cyber security. The study of this helped these programs to mitigate high cost in Data breach remediation, legal fees, and cyber attacks. After reading this article, Bug Bounty Programs showed progress in cyber security, because it made sure that they managed everything safely and carefully. 

Journal Entry #14

In this article the author discusses how there are multiple illegal activities that people do online. The 5 most serious violations I have picked from these 11 illegal online activities are using torrent services, bullying and trolling, faking your identity online, using unofficial streaming services and using copyrighting images. These 5 violations are very serious and here’s why:

using torrent services- a way for users to get a pirated copy of music and movies. It’s illegal to take these copyrighted materials without paying for them or getting consent. 

bullying and trolling- there are all laws that cyber bullying is not allowed and could lead to possible jail time.

faking your identity online- identity fraud or using someone else’s identity information is a crime. It’s dangerous and can expose people in negative ways. using unofficial streaming services- its illegal and is a copyright violation.using copyrighted images- can use others’ taken images if not having permission or payment.

Journal Entry #15

The career of digital forensics very much relates to social science, after listening to this video. Teo’s journey helped show me that his career with digital forensics is not all about technology, but it also involves the understanding of human behavior. It relates because in this video Teo’s dives in on it and says that digital forensics investigators not only need to be tech savvy but need to understand social things that go with crime. I thought Teo’s pathway/ journey to his career was very interesting and motivating.  He used his journey and explained why his journey was important when comparing technical skills with understanding human behavior.