Journal 1:
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
- After reviewing the NICE Workforce Framework, the area that would most appeal to me is digital forensics. I chose digital forensics because it plays a role in investigating cybercrimes and I’m interested in that. It involves solving hard puzzles to catch cyber criminals using digital evidence. I would be able to understand what they’re doing and put a stop to it to make the digital world safer for people and protect privacy. The area that I am least appealed by is Data administration because reading about it I wasn’t too fascinated by it. I would be looking at a lot of graphs and numbers and I would like to be more involved in cybercrime.
Journal 2:
Explain how the principles of science relate to cybersecurity.
- The principle of science relates to cybersecurity because the principles of science can be applied to cybersecurity through the framework. The principles are Relativism, Objectivity, Parsimony, Empiricism, and Ethical Neutrality. Relativism means all things are related. Objectivity means going by facts and evidence rather than opinions. Parsimony means keeping explanations as simple as possible. Empiricism means observation should be based on human senses and experiments. Ethical Neutrality means going by ethical standards when doing research. All of these connect with science and cybersecurity.
Journal 3:
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
- After exploring PrivacyRights.org and delving into their comprehensive resources on data breaches, I was impressed by the user-friendly interface and the wealth of information available. Researchers can leverage this platform to conduct in-depth studies on data breaches due to its detailed insights into the nature of such incidents. PrivacyRights.org not only delineates various types of data breaches but also elucidates how individuals may fall victim to information exposure. The platform offers valuable guidance on preventive measures, outlining ways to fortify one’s defenses against breaches. Moreover, it provides recommendations for essential software safeguards on various devices such as computers and laptops. This wealth of information positions PrivacyRights.org as a valuable resource for researchers delving into the intricacies of data breaches and cybersecurity.
Journal 4:
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
- After digging into Maslow’s Hierarchy of Needs, I noticed how much technology is a part of my daily life, helping me in different areas. It’s not just a tool; it supports me in various aspects. When it comes to basics like food, I use delivery apps. They make it easy to get a meal without cooking or going out. For safety needs (financial security), technology helps me manage money and keep an eye on transactions, taking care of my safety needs. Social media and communication apps are my go-to for connecting with friends and family, meeting my need for love and belonging. Learning apps boost my self-esteem, letting me develop skills and expand my knowledge. And for self-actualization, the highest level of Maslow’s pyramid, I turn to learning apps like Duolingo to pick up new languages. It’s like a pathway to continuous learning and personal growth, all thanks to technology.
Week 5:
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- Political: This resonates with me the most as in the political arena, only one candidate can emerge victorious. Consequently, candidates often resort to uncovering negative information about their opponents to sway voters in their favor.
- Money: The allure of wealth can drive individuals to engage in extraordinary actions. Many scammers and hackers are motivated by the desire to amass large sums of money, leading them to resort to unethical practices.
- Revenge: The article underscores how victims of revenge porn often feel betrayed by the legal system, compelling them to seek their own retribution. This sense of betrayal can fuel their determination to take matters into their own hands and seek vengeance.
- Multiple Reasons– I ranked this the 4th because it could mean different things. An individual might choose to focus their actions on someone resembling the individual who rejected them, engaging in online criminal activities as a response to the emotional pain caused by that person, whom they likely should have confided in about their hurt feelings.
- Recognition: This concept doesn’t resonate with me because I believe individuals would prefer to be acknowledged for accomplishments in fields like sports, arts, and other endeavors rather than hacking.
- Entertainment: The notion of hacking into people’s information, particularly on platforms like LinkedIn, and selling it for entertainment purposes strikes me as nonsensical and harmful. It’s important to recognize the real-life consequences this activity can have on individuals whose privacy is compromised.
- Boredom: I’ve rated this as the least likely motive because it lacks any substantial justification. It’s difficult to comprehend how someone could simply wake up and decide to hack purely out of boredom. Although the article mentions targeting 3-13 year olds, this motive seems too narrow and illogical.
Week 6:
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
- To spot the difference between a fake a website and a real website is the most important factors is the URL: genuine websites often use a secure connection, indicated by “https://” at the beginning of the address, along with a padlock symbol next to the URL in the browser. Fake websites might use misleading domain names that closely mimic those of real sites, but with subtle misspellings or additional characters. Another factor is the contact information; real websites usually provide legitimate contact details, such as a physical address, phone number, and email address, whereas fake sites may lack this information or provide false details.
Fake website:
The website “https://www.thedogisland.com/” is widely recognized as a fictitious or hoax site due to its implausible claims about an island where dogs can live freely without their owners. Such a concept, while charming, lacks verifiable details, logistical feasibility, and any endorsements from reputable animal welfare organizations, which are essential for genuine sanctuaries. The site likely serves as a piece of creative storytelling or social commentary, designed to entertain or provoke thought rather than to represent a real-world location. Its existence underscores the importance of critically evaluating online information, especially when it presents extraordinary claims.
The website “https://web.archive.org/web/20140316042806/http://www.wemarket4u.net/fatfoe/” seems suspect for a few reasons. Its name, “wemarket4u.net,” sounds generic and more like a catch-all marketing site than a legitimate business, hinting at possible deceptive practices. The “/fatfoe/” part suggests it might have been involved in the often dubious weight loss industry, which is rife with false claims. Being archived on the Wayback Machine indicates the site is no longer active, possibly shut down due to questionable activities or because it served a temporary scam purpose. This archived status suggests a lack of credibility and raises questions about its authenticity.
The website “https://www.dhmo.org/” is a hoax that humorously frames water (H2O) as a dangerous chemical called dihydrogen monoxide. It uses scientific terminology to make ordinary water sound hazardous, demonstrating how scientific information can be misleadingly presented. The site is educational, highlighting the need for critical thinking and scientific literacy by showcasing how facts can be distorted to alarm the public.
Journal 7:
Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
Meme 1: He thought moving places would hide him but didn’t know that his internet address could still be tracked, even way up high.
Meme 2: This teacher is tired of people falling for the scam tricks, so he has a class of ways to not get scammed.
Meme 3: A guys enters a coffee shop that offers free Wi-Fi, what he doesn’t know is that the Wi-Fi is unsecured and vulnerable to attacks. When his computer crashes, he starts to panic.
Journal 8:
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
- I’ve come to realize that the media’s influence on my understanding of cybersecurity might not be as straightforward as I once thought. Initially, I believed that media coverage was essential for raising awareness and educating the public about cyber threats. However, upon reflection, I’ve noticed that the sensationalism and oversimplification common in media reports can actually distort my perception of cybersecurity risks, leading to a skewed or exaggerated sense of danger. This realization has made me more skeptical of the immediate impact media has on shaping my views and behaviors regarding cybersecurity. Instead of taking media reports at face value, I now understand the importance of approaching such information with caution.
Journal 9:
Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
- On the social media disorder scale I scored a 3/9. I’m not the type of person that uses social media for everything and allows it to consume me. When I do use social media I use it for entertainment purposes. The items on the scale can all correlate to at least one person. I think the different patterns are found across the world because the usage of social media varies between different countries. Some countries are not that advanced in technology and have access to social media while other countries do.
Journal 10:
Read this and write a journal entry summarizing your response to the article on social cybersecurity
The article delves into the shifting landscape of national security, brought into focus by the rise of social cybersecurity, which not only transcends traditional cybersecurity by addressing the manipulation of societies and individuals but also underscores the profound influence of cyber-mediated changes on human behavior, societal dynamics, and political arenas. It advocates for a multifaceted response that includes education, policy innovation, and interdisciplinary collaboration to confront the nuances of social cybersecurity. Drawing from my insights gained in an interdisciplinary studies course, the emphasis on guarding against external influence and the pivotal roles of information and psychological warfare are particularly resonant, highlighting the urgent need for adaptive strategies in the global information space. This narrative convincingly argues for the crucial acknowledgment and proactive engagement with social cybersecurity as a means to preserve national influence and security amidst evolving threats.
Journal 11:
Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
- The role of a cybersecurity analyst encompasses a wide range of responsibilities and tasks, which can vary significantly based on the workplace. Understanding social dynamics is crucial, as highlighted by discussions on phishing and various attacks orchestrated through social engineering in the network. The constant search for weaknesses and entry points by hackers and cybercriminals underscores the uniqueness of each organization, shaped by its distinct personnel. Moreover, the video underscored the importance of training and education within the role, emphasizing these as social undertakings essential for developing insights into human behavior, vital for safeguarding networks.
Journal 12:
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
Economic Theory’s
- Information Asymmetry: This theory deals with situations in which one party has superior or more information than the other. Regarding the data breach, the extent of the breach and the risks to customers were initially known to the company and its platform provider better than the customers themselves. The notification attempts to address this imbalance by alerting those who are impacted and enabling them to take steps to avoid it. The disparity was temporarily caused by the notification delay, which was requested by law enforcement so as not to jeopardize the investigation.
- Externalities: Externalities are expenses or benefits that are carried by a party other than the one who chose to bear them. The data breach letter serves as an example of negative externalities, in which customers and financial institutions, rather than the business itself, bear the cost of a cybersecurity failure (such as fraud or identity theft). Attempts to reduce these external costs include the actions recommended in the letter, such as monitoring financial statements and getting in touch with credit card companies.
Social sciences Theory
- Trust and Social Capital: The networks of connections that exist among the individuals who reside and work in a given society that allow its smooth operation are referred to as social capital. One essential element of social capital is trust. A data breach damages a company’s reputation with customers and may even reduce social capital. Effective corrective measures and open communication are necessary to regain this trust, as the breach notification letter tries to do.
- Crisis Communication Theory: This theory investigates the ways in which organizations interact with different stakeholders in times of crisis. Managing stakeholder perceptions and minimizing damage to reputation are the goals of effective crisis communication. The letter from Glasswasherparts.com uses a number of crisis communication techniques, including giving a thorough explanation of the event, detailing the actions the company took to address the breach, and advising clients on self-defense. This strategy aims to rebuild confidence and lessen the crisis’ detrimental effects on the business’s relationship with its clients.
Journal 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
- Upon reviewing the article, I’ve come to appreciate the effectiveness of comprehensive bug bounty programs. These initiatives serve as a cost-effective strategy for enhancing cybersecurity, particularly for networks or organizations lacking the resources to maintain a dedicated cybersecurity team. Such programs are especially beneficial for smaller companies as a temporary solution until they can establish their own cybersecurity department. I found the concept of bug bounty programs both intriguing and valuable for enhancing overall safety. Additionally, these programs are inclusive, inviting participants from diverse backgrounds to contribute their unique perspectives on identifying and resolving vulnerabilities, ultimately benefiting a broader audience.
Journal 14:
Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
- The most serious wrong action by Andriy Slynchuk is gathering information about kids. It’s really bad and was immediately seen as a top issue. It’s shocking how some people aim to misuse children’s data online. The internet, especially social media, is risky for kids because it’s too easy for others to track and collect their information.
- The second big problem is recording voice calls without asking. By law, you need to tell and get okay from the people you’re talking to if you want to record them. It would really bother and upset me to find out someone recorded our call without telling me.
- Third, using someone else’s Wi-Fi without permission is not right. It’s okay to use public Wi-Fi in places like stores, but breaking into someone’s private home Wi-Fi is invading their privacy and very strange. This could let someone get access to private stuff through the devices connected to that Wi-Fi.
- Fourth, taking and using someone else’s pictures without saying where you got them from is also a big no. This is serious because it’s stealing someone else’s hard work for your own benefit. It’s not fair when someone else takes all the credit and possibly makes money off someone else’s work.
- Lastly, pretending to be someone else online is the fifth major issue. People do this to trick others into giving them money or personal info. Even though it’s partly because people can be too trusting, it’s not their fault they got fooled. It’s illegal and wrong to pretend to be someone else to take advantage of them.
Journal 15:
Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site.Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
- In my view, the speaker describes his career journey as a winding road. He mentioned that during his time, there wasn’t much development in the field, you were either in it or not. I believe this illustrates a crucial point about choosing the right career path. For me, the idea of testing the waters doesn’t resonate as strongly as fully immersing oneself. He then shares that although he’s an accountant by profession, he got involved in IT work when a firm needed assistance with their networks. Despite being an accountant, he found himself increasingly drawn to IT work. This decision to diverge from his original path is a testament to the fact that even if you’re well-practiced in one field, you can still explore new avenues. This deviation led him to establish Australia’s first national digital forensic practice, and he never looked back. I believe the speaker’s journey, ultimately finding a career he’s passionate about, epitomizes what many of us aim for.