{"id":266,"date":"2024-04-22T03:07:53","date_gmt":"2024-04-22T03:07:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/?page_id=266"},"modified":"2024-04-22T18:49:01","modified_gmt":"2024-04-22T18:49:01","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/blog\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>Journal 1:<\/p>\n\n\n\n<p>Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.<\/p>\n\n\n\n<ul>\n<li>After reviewing the NICE Workforce Framework, the area that would most appeal to me is digital forensics. I chose digital forensics because it plays a role in investigating cybercrimes and I\u2019m interested in that. It involves solving hard puzzles to catch cyber criminals using digital evidence. I would be able to understand what they\u2019re doing and put a stop to it to make the digital world safer for people and protect privacy. The area that I am least appealed by is Data administration because reading about it I wasn\u2019t too fascinated by it. I would be looking at a lot of graphs and numbers and I would like to be more involved in cybercrime.<\/li>\n<\/ul>\n\n\n\n<p>Journal 2:<\/p>\n\n\n\n<p>Explain how the principles of science relate to cybersecurity.<\/p>\n\n\n\n<ul>\n<li>The principle of science relates to cybersecurity because the principles of science can be applied to cybersecurity through the framework. The principles are Relativism, Objectivity, Parsimony, Empiricism, and Ethical Neutrality. Relativism means all things are related. Objectivity means going by facts and evidence rather than opinions. Parsimony means keeping explanations as simple as possible. Empiricism means observation should be based on human senses and experiments. Ethical Neutrality means going by ethical standards when doing research. All of these connect with science and cybersecurity.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Journal 3:<\/p>\n\n\n\n<p>Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<ul>\n<li>After exploring PrivacyRights.org and delving into their comprehensive resources on data breaches, I was impressed by the user-friendly interface and the wealth of information available. Researchers can leverage this platform to conduct in-depth studies on data breaches due to its detailed insights into the nature of such incidents. PrivacyRights.org not only delineates various types of data breaches but also elucidates how individuals may fall victim to information exposure. The platform offers valuable guidance on preventive measures, outlining ways to fortify one\u2019s defenses against breaches. Moreover, it provides recommendations for essential software safeguards on various devices such as computers and laptops. This wealth of information positions PrivacyRights.org as a valuable resource for researchers delving into the intricacies of data breaches and cybersecurity.<\/li>\n<\/ul>\n\n\n\n<p>Journal 4:<\/p>\n\n\n\n<p>Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/p>\n\n\n\n<ul>\n<li>After digging into Maslow\u2019s Hierarchy of Needs, I noticed how much technology is a part of my daily life, helping me in different areas. It\u2019s not just a tool; it supports me in various aspects. When it comes to basics like food, I use delivery apps. They make it easy to get a meal without cooking or going out. For safety needs (financial security), technology helps me manage money and keep an eye on transactions, taking care of my safety needs. Social media and communication apps are my go-to for connecting with friends and family, meeting my need for love and belonging. Learning apps boost my self-esteem, letting me develop skills and expand my knowledge. And for self-actualization, the highest level of Maslow\u2019s pyramid, I turn to learning apps like Duolingo to pick up new languages. It\u2019s like a pathway to continuous learning and personal growth, all thanks to technology.<\/li>\n<\/ul>\n\n\n\n<p>Week 5:<\/p>\n\n\n\n<p>Review the articles linked with each individual motive in the presentation page or Slide #4.&nbsp; Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).&nbsp; Explain why you rank each motive the way you rank it.<\/p>\n\n\n\n<ul>\n<li><strong>Political:<\/strong> This resonates with me the most as in the political arena, only one candidate can emerge victorious. Consequently, candidates often resort to uncovering negative information about their opponents to sway voters in their favor.<\/li>\n\n\n\n<li><strong>Money:<\/strong> The allure of wealth can drive individuals to engage in extraordinary actions. Many scammers and hackers are motivated by the desire to amass large sums of money, leading them to resort to unethical practices.<\/li>\n\n\n\n<li><strong>Revenge: <\/strong>The article underscores how victims of revenge porn often feel betrayed by the legal system, compelling them to seek their own retribution. This sense of betrayal can fuel their determination to take matters into their own hands and seek vengeance.<\/li>\n\n\n\n<li><strong>Multiple Reasons<\/strong>\u2013 I ranked this the 4th because it could mean different things. An individual might choose to focus their actions on someone resembling the individual who rejected them, engaging in online criminal activities as a response to the emotional pain caused by that person, whom they likely should have confided in about their hurt feelings.<\/li>\n\n\n\n<li><strong>Recognition:<\/strong> This concept doesn\u2019t resonate with me because I believe individuals would prefer to be acknowledged for accomplishments in fields like sports, arts, and other endeavors rather than hacking.<\/li>\n\n\n\n<li><strong>Entertainment:<\/strong> The notion of hacking into people\u2019s information, particularly on platforms like LinkedIn, and selling it for entertainment purposes strikes me as nonsensical and harmful. It\u2019s important to recognize the real-life consequences this activity can have on individuals whose privacy is compromised.<\/li>\n\n\n\n<li><strong>Boredom: <\/strong>I\u2019ve rated this as the least likely motive because it lacks any substantial justification. It\u2019s difficult to comprehend how someone could simply wake up and decide to hack purely out of boredom. Although the article mentions targeting 3-13 year olds, this motive seems too narrow and illogical.<\/li>\n<\/ul>\n\n\n\n<p>Week 6:<\/p>\n\n\n\n<p>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/p>\n\n\n\n<ul>\n<li>To spot the difference between a fake a website and a real website is the most important factors is the URL: genuine websites often use a secure connection, indicated by \u201chttps:\/\/\u201d at the beginning of the address, along with a padlock symbol next to the URL in the browser. Fake websites might use misleading domain names that closely mimic those of real sites, but with subtle misspellings or additional characters. Another factor is the contact information; real websites usually provide legitimate contact details, such as a physical address, phone number, and email address, whereas fake sites may lack this information or provide false details.<\/li>\n<\/ul>\n\n\n\n<p><strong>Fake website:<\/strong><\/p>\n\n\n\n<p>The website \u201c<a href=\"https:\/\/www.thedogisland.com\/\">https:\/\/www.thedogisland.com\/<\/a>\u201d is widely recognized as a fictitious or hoax site due to its implausible claims about an island where dogs can live freely without their owners. Such a concept, while charming, lacks verifiable details, logistical feasibility, and any endorsements from reputable animal welfare organizations, which are essential for genuine sanctuaries. The site likely serves as a piece of creative storytelling or social commentary, designed to entertain or provoke thought rather than to represent a real-world location. Its existence underscores the importance of critically evaluating online information, especially when it presents extraordinary claims.<\/p>\n\n\n\n<p><br>The website \u201c<a href=\"https:\/\/web.archive.org\/web\/20140316042806\/http:\/\/www.wemarket4u.net\/fatfoe\/\">https:\/\/web.archive.org\/web\/20140316042806\/http:\/\/www.wemarket4u.net\/fatfoe\/<\/a>\u201d seems suspect for a few reasons. Its name, \u201cwemarket4u.net,\u201d sounds generic and more like a catch-all marketing site than a legitimate business, hinting at possible deceptive practices. The \u201c\/fatfoe\/\u201d part suggests it might have been involved in the often dubious weight loss industry, which is rife with false claims. Being archived on the Wayback Machine indicates the site is no longer active, possibly shut down due to questionable activities or because it served a temporary scam purpose. This archived status suggests a lack of credibility and raises questions about its authenticity.<\/p>\n\n\n\n<p>The website \u201c<a href=\"https:\/\/www.dhmo.org\/\">https:\/\/www.dhmo.org\/<\/a>\u201d is a hoax that humorously frames water (H2O) as a dangerous chemical called dihydrogen monoxide. It uses scientific terminology to make ordinary water sound hazardous, demonstrating how scientific information can be misleadingly presented. The site is educational, highlighting the need for critical thinking and scientific literacy by showcasing how facts can be distorted to alarm the public.<\/p>\n\n\n\n<p>Journal 7:<\/p>\n\n\n\n<p>Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/4HvB9J4w_bz7SibJnJ5LJv7YRLgkKP28XirSBMdNkS0_kxNQtHgSJaO0MNNVVFfLl4A6OKJ0TwGFDAoWeocJMloKNV04dw71iMWIDU6fwWhM07Or3b6tX30PWXdpI1gd5_fg3L3bK9emXXM-vSWjocw\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/SDHBazXmKhDqjPKH_G5kvRTIC8W3c0DswepnNwt90NTGNgFm3c0FHX3yD0HBCglQCqq8HQEn6hqyP-Xxa6U5q6RmUS-453fAH7Y9BsuaPgFWqPydLZWN3ECehBjp5BWfD7-Vhxkscpbska6KCDMX5Hw\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/3n2ywsiY90ahtwjZRR3ZcphkhZNJDcZE2ZwfRMXMalAwHAaPhzICKyI8t69Y3DIAsawsEhHLxeTk0nAZ3Kbn6Lt6492yP3gpnayY_LeG09sP7Bw5CmUHgGom96XUXAqCYBpxLANKD_ZzbF6cqSYuGZA\" alt=\"\" \/><\/figure>\n\n\n\n<p>Meme 1: He thought moving places would hide him but didn\u2019t know that his internet address could still be tracked, even way up high.<\/p>\n\n\n\n<p>Meme 2: This teacher is tired of people falling for the scam tricks, so he has a class of ways to not get scammed.<\/p>\n\n\n\n<p>Meme 3: A guys enters a coffee shop that offers free Wi-Fi, what he doesn\u2019t know is that the Wi-Fi is unsecured and vulnerable to attacks. When his computer crashes, he starts to panic.<\/p>\n\n\n\n<p>Journal 8:<\/p>\n\n\n\n<p>After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.<\/p>\n\n\n\n<ul>\n<li>I\u2019ve come to realize that the media\u2019s influence on my understanding of cybersecurity might not be as straightforward as I once thought. Initially, I believed that media coverage was essential for raising awareness and educating the public about cyber threats. However, upon reflection, I\u2019ve noticed that the sensationalism and oversimplification common in media reports can actually distort my perception of cybersecurity risks, leading to a skewed or exaggerated sense of danger. This realization has made me more skeptical of the immediate impact media has on shaping my views and behaviors regarding cybersecurity. Instead of taking media reports at face value, I now understand the importance of approaching such information with caution.<\/li>\n<\/ul>\n\n\n\n<p>Journal 9:<\/p>\n\n\n\n<p>Complete the <a href=\"https:\/\/www.brieftherapyconference.com\/download\/handouts\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\">Social Media Disorder scaleLinks to an external site.<\/a>.&nbsp; How did you score?&nbsp; What do you think about the items in the scale?&nbsp; Why do you think that different patterns are found across the world?<\/p>\n\n\n\n<ul>\n<li>On the social media disorder scale I scored a 3\/9. I\u2019m not the type of person that uses social media for everything and allows it to consume me. When I do use social media I use it for entertainment purposes. The items on the scale can all correlate to at least one person. I think the different patterns are found across the world because the usage of social media varies between different countries. Some countries are not that advanced in technology and have access to social media while other countries do.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Journal 10:<\/p>\n\n\n\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p>&nbsp;<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site.<\/a><\/p>\n\n\n\n<p>The article delves into the shifting landscape of national security, brought into focus by the rise of social cybersecurity, which not only transcends traditional cybersecurity by addressing the manipulation of societies and individuals but also underscores the profound influence of cyber-mediated changes on human behavior, societal dynamics, and political arenas. It advocates for a multifaceted response that includes education, policy innovation, and interdisciplinary collaboration to confront the nuances of social cybersecurity. Drawing from my insights gained in an interdisciplinary studies course, the emphasis on guarding against external influence and the pivotal roles of information and psychological warfare are particularly resonant, highlighting the urgent need for adaptive strategies in the global information space. This narrative convincingly argues for the crucial acknowledgment and proactive engagement with social cybersecurity as a means to preserve national influence and security amidst evolving threats.<\/p>\n\n\n\n<p>Journal 11:<\/p>\n\n\n\n<p>Watch this <a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\">videoLinks to an external site.<\/a>.&nbsp; As you watch the video<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an external site.<\/a> think about how the description of the cybersecurity analyst job relates to social behaviors.&nbsp; Write a paragraph describing social themes that arise in the presentation.<\/p>\n\n\n\n<ul>\n<li>The role of a cybersecurity analyst encompasses a wide range of responsibilities and tasks, which can vary significantly based on the workplace. Understanding social dynamics is crucial, as highlighted by discussions on phishing and various attacks orchestrated through social engineering in the network. The constant search for weaknesses and entry points by hackers and cybercriminals underscores the uniqueness of each organization, shaped by its distinct personnel. Moreover, the video underscored the importance of training and education within the role, emphasizing these as social undertakings essential for developing insights into human behavior, vital for safeguarding networks.<\/li>\n<\/ul>\n\n\n\n<p>Journal 12:<\/p>\n\n\n\n<p>Read this <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.<\/a> sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/p>\n\n\n\n<p>Economic Theory\u2019s<\/p>\n\n\n\n<ul>\n<li>Information Asymmetry: This theory deals with situations in which one party has superior or more information than the other. Regarding the data breach, the extent of the breach and the risks to customers were initially known to the company and its platform provider better than the customers themselves. The notification attempts to address this imbalance by alerting those who are impacted and enabling them to take steps to avoid it. The disparity was temporarily caused by the notification delay, which was requested by law enforcement so as not to jeopardize the investigation.<\/li>\n\n\n\n<li>Externalities: Externalities are expenses or benefits that are carried by a party other than the one who chose to bear them. The data breach letter serves as an example of negative externalities, in which customers and financial institutions, rather than the business itself, bear the cost of a cybersecurity failure (such as fraud or identity theft). Attempts to reduce these external costs include the actions recommended in the letter, such as monitoring financial statements and getting in touch with credit card companies.<\/li>\n<\/ul>\n\n\n\n<p>Social sciences Theory<\/p>\n\n\n\n<ul>\n<li>Trust and Social Capital: The networks of connections that exist among the individuals who reside and work in a given society that allow its smooth operation are referred to as social capital. One essential element of social capital is trust. A data breach damages a company\u2019s reputation with customers and may even reduce social capital. Effective corrective measures and open communication are necessary to regain this trust, as the breach notification letter tries to do.<\/li>\n\n\n\n<li>Crisis Communication Theory: This theory investigates the ways in which organizations interact with different stakeholders in times of crisis. Managing stakeholder perceptions and minimizing damage to reputation are the goals of effective crisis communication. The letter from Glasswasherparts.com uses a number of crisis communication techniques, including giving a thorough explanation of the event, detailing the actions the company took to address the breach, and advising clients on self-defense. This strategy aims to rebuild confidence and lessen the crisis\u2019 detrimental effects on the business\u2019s relationship with its clients.<\/li>\n<\/ul>\n\n\n\n<p>Journal 13<\/p>\n\n\n\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.&nbsp; To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.&nbsp; The policies relate to economics in that they are based on cost\/benefits principles.&nbsp; Read this article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>&nbsp; and write a summary reaction to the use of the policies in your journal.&nbsp; Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<ul>\n<li>Upon reviewing the article, I\u2019ve come to appreciate the effectiveness of comprehensive bug bounty programs. These initiatives serve as a cost-effective strategy for enhancing cybersecurity, particularly for networks or organizations lacking the resources to maintain a dedicated cybersecurity team. Such programs are especially beneficial for smaller companies as a temporary solution until they can establish their own cybersecurity department. I found the concept of bug bounty programs both intriguing and valuable for enhancing overall safety. Additionally, these programs are inclusive, inviting participants from diverse backgrounds to contribute their unique perspectives on identifying and resolving vulnerabilities, ultimately benefiting a broader audience.<\/li>\n<\/ul>\n\n\n\n<p>Journal 14:<\/p>\n\n\n\n<p><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\">Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.<\/a>has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/p>\n\n\n\n<ul>\n<li>The most serious wrong action by Andriy Slynchuk is gathering information about kids. It\u2019s really bad and was immediately seen as a top issue. It\u2019s shocking how some people aim to misuse children\u2019s data online. The internet, especially social media, is risky for kids because it\u2019s too easy for others to track and collect their information.<\/li>\n\n\n\n<li>The second big problem is recording voice calls without asking. By law, you need to tell and get okay from the people you\u2019re talking to if you want to record them. It would really bother and upset me to find out someone recorded our call without telling me.<\/li>\n\n\n\n<li>Third, using someone else\u2019s Wi-Fi without permission is not right. It\u2019s okay to use public Wi-Fi in places like stores, but breaking into someone\u2019s private home Wi-Fi is invading their privacy and very strange. This could let someone get access to private stuff through the devices connected to that Wi-Fi.<\/li>\n\n\n\n<li>Fourth, taking and using someone else\u2019s pictures without saying where you got them from is also a big no. This is serious because it\u2019s stealing someone else\u2019s hard work for your own benefit. It\u2019s not fair when someone else takes all the credit and possibly makes money off someone else\u2019s work.<\/li>\n\n\n\n<li>Lastly, pretending to be someone else online is the fifth major issue. People do this to trick others into giving them money or personal info. Even though it\u2019s partly because people can be too trusting, it\u2019s not their fault they got fooled. It\u2019s illegal and wrong to pretend to be someone else to take advantage of them.<\/li>\n<\/ul>\n\n\n\n<p>Journal 15:<\/p>\n\n\n\n<p>Digital Forensics | Davin Teo | TEDxHongKongSalon<a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\">\u2013 YouTubeLinks to an external site.<\/a>Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/p>\n\n\n\n<ul>\n<li>In my view, the speaker describes his career journey as a winding road. He mentioned that during his time, there wasn\u2019t much development in the field, you were either in it or not. I believe this illustrates a crucial point about choosing the right career path. For me, the idea of testing the waters doesn\u2019t resonate as strongly as fully immersing oneself. He then shares that although he\u2019s an accountant by profession, he got involved in IT work when a firm needed assistance with their networks. Despite being an accountant, he found himself increasingly drawn to IT work. This decision to diverge from his original path is a testament to the fact that even if you\u2019re well-practiced in one field, you can still explore new avenues. This deviation led him to establish Australia\u2019s first national digital forensic practice, and he never looked back. I believe the speaker\u2019s journey, ultimately finding a career he\u2019s passionate about, epitomizes what many of us aim for.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Journal 1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. Journal 2: Explain how the principles of science relate to cybersecurity. Journal 3: Visit PrivacyRights.org to see the types of [&hellip;]<\/p>\n","protected":false},"author":25059,"featured_media":0,"parent":173,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/pages\/266"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/users\/25059"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/comments?post=266"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/pages\/266\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/pages\/266\/revisions\/357"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/pages\/173"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/angel-tanoh\/wp-json\/wp\/v2\/media?parent=266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}