Cybersecurity analysts jobs are very closely intertwined with social behaviors. Communication is a necessity and a cybersecurity analyst could not do their job without communication. Additionally, cooperation is key. Without all of its parts, a machine cannot run properly, the same is true in cybersecurity settings. Even if it is seen as an entry level position, a cybersecurity analyst, is as important as the Cybersecurity director. Creating the correct workplace culture is also imperative to an easier cybersecurity analyst job and workload. Fostering a learning environment for those not within cybersecurity creates an environment where people want to learn and lessens incidents.
Journal Entry
Journal Entry #10
The article focuses on the changing aspect of warfare and how social cybersecurity has transformed from an unknown to the centerpiece of information safeguarding. The article correctly points out that cyberwarfare is becoming increasingly more common, while physical warfare is not. This brings a new type of control via the media that is allowed through a country, with social manipulation. However, this does not stand true for a nation as closed off as North Korea, which denies outside internet connections. Although social manipulation via media would be harder in a nation such as the United States where information is so incredibly accessible that creating a movement that follows that actions and reactions would be nearly impossible.
Journal Entry #9
After watching the video and scoring myself, I would have a two out of nine score, or less than that for what would be considered ‘disordered social media user.’ The items within the scale would be what I would consider the most prevalent and the most damaging of items regarding to a disorder surrounding social media use. With certain items, like persistence, being more prevalent in a place like the United States, different items show up more often in different areas of the world. This is most likely due to the differences in culture and law in these areas. With some countries having laws determining at what age and how much time one can use on social media or some cultures dissuade individuals that interact with certain types of content and cause issues more like deception or conflict.
Journal Entry #8
After watching the video, I can say that the media has a decent base of understanding about cybersecurity. While almost all clips contained flaws, many were at least believable to a certain point. Common faults seemed to be programs, code, screens, and devices. It seemed that the media understood that special programs were utilized, but did not recreate them in an accurate manner consistently. They also understood that specialized devices existed, but they looked too movie-magic for it to be considered ‘realistic’ in many scenarios. The media as a whole has a decent grasp on cybersecurity that will become more realistic in nature as time progresses.
Journal Entry #6
Fake websites are designed to pass with mostly a quick glance and not looking deeper into the site. The first way to tell if a site is fake is to read the page. Many fake websites will have spelling and grammatical errors littered throughout the site. A second way to tell the difference between a fake and real website is the certificates the site has. Looking for a sites’ organization or extended validation, OV and EV respectively, can ensure that the company is not only validated but also externally vetted as well. The third option one could use to spot a fake website versus a real one is the URL. There are many sites that are slight misspellings of very common websites, like Google, that are created to look like the page but actually be collecting information.
Journal Entry #5
Motives for cybercrime can vary wildly per person and case. Out of the seven multiple reasons is the most reasonable, as there is hardly ever one sole reason for anything in life. The second most reasonable is political, as we have seen the rise in political attacks via governments of countries attacking one another, as the reasons are usually for the gain of a country or group. The third most reasonable would be revenge, depending on the exact reason for revenge it could bee seen more as ‘an eye for an eye.’ The fourth most reasonable motive for cybercrime is money, lack of money and other resources is a leading factor for crime in general, to make oneself stable in life is a reasonable stance. Recognition is the fifth most reasonable, as society puts much emphasis on name recognition so if you could make your name known that would fulfill your goal. The sixth most reasonable would be boredom, with monotony becoming an ever increasing issue creating a different situation or dynamic to cure boredom could be seen as reasonable. The least reasonable is for entertainment, entertainment would likely entail hurting others in some fashion just for a laugh or joke.
Journal Entry #3
Researchers could get a great deal of information from PrivacyRights.org. For studying data breaches, this site would allow them to catalog breaches since the site’s creation. With this, larger trends can become clearer as time passes and how they change over time. Types of breaches could be grouped as well to see if there are repeating security breaches across companies and sectors. The amount of information is itself worth the researchers’ time, and the data that can be extrapolated is even better.
Journal Entry #4
Maslow’s hierarchy of needs sets a precedent for what each individual needs to survive and be happy. The first layer, physiological needs, can be completed with modern technology in hospitals such as ventilators. The second layer, safety and security, is easiest completed with modern security systems that can prevent harm to you. The middle layer, love and belonging, cannot be actualized through technology. The fourth layer, self-esteem, can be achieved with programs like photoshop, photo filters, and social media. The final layer in the hierarchy is self-actualization, which the modern internet/social media can assist with.
Journal Entry #2
The principles of science relate heavily to cybersecurity as a whole. Relativism states that all things are related which can be emphasized by the growing necessity of technology within schools, the government, or even our daily lives. Objectivity states that no opinion or view is emphasized and that facts are facts, without faction. This can be used when discussing the nature and consequences of cybercrime. Parsimony explains how science should keep explanations as simple as possible, this is useful in cybersecurity when explaining systems and hardware to those that are not specially trained in such a field. Empiricism is the attitude that sciences should be kept to the human senses, as cybersecurity should rely on what we know instead of erroneous and possibly dangerous solutions. Ethical Neutrality is the fact of ethical standards within research, this applies to cybersecurity when it comes to discussing user data and how it should be stored. Determinism is the principle that all actions are due to previous events that occurred, this is useful when attempting to gain motives in cybercrime.
Journal Entry #1
The area in which I would like to focus my career on would be Data Administration. I enjoy the explanation of Data Administration because of the focus on protection and availability of data. It dictates where data is needed, how it is stored, and helps control the workflow of the greater workplace. This area is always where I have seen myself in the future and how I would want to work on a more daily basis. An area that I would not appeal to me is Targets. It involves an area of social sciences in which I am not strong at and therefore does not interest me.