Journal Entry’s
Journal One
After reviewing the NICE workforce framework there are a few careers that I would focus on and they are investing, collect and operate, protect and defend and lastly securely provision . I picked multiple because in this field there will always be plenty of work to do however they could all be completely different . My goal for my career is to enjoy my job all the time . The careers within the framework I picked descriptions all seemed interesting to me whereas others did not . Such as analyzing , when it comes to analyzing many graphs are involved and that is not something I enjoy doing . Also along with overseeing and govern , although it sound interesting in a way I feel as much of it would be repeated within the field .
Journal Two
The same procedures you use to conduct an experiment in a science lesson also apply to cybersecurity: observation, hypothesis, and testing. Take the case of observing a security branch, formulating a theory, and testing it. It sounds like such an interesting job—kind of like being a digital detective. Professionals in cybersecurity use observation to find trends, patterns, and weak points in computer systems. Regarding hypothesis, experts examine data and how it changes to identify anomalies, etc. The testing comes last; it’s similar to a scientific class again, but the experts employ cybersecurity technologies and statistical analysis. Learning this was very interesting, especially comparing it to my science labs
Journal Three
There are several methods that researchers might use breaches of public data to examine breaches. They are able to examine the kinds of information that were hacked, the techniques hackers employed, and the weaknesses that they took advantage of. This aids in their comprehension of recurring trends and the creation of stronger defenses against intrusions in the future .Researchers examine exposed data, including credit card numbers, email addresses, usernames, passwords, and even basic personal information, when they are examining publicly available breach data. They look at a lot of variables, but particularly things like how sensitive the data is. Researchers can identify common targets and hacker patterns by examining this, which aids in the prevention of such incidents.
Journal Four
Technology relates to our life in every aspect without us even analyzing it .When first looking at Maslow’s Hierarchy of Needs I thought ” how is this dealing with technology” however it ties into it perfectly . Starting with the first level of physiological needs which are food, water, warmth, and rest .Although these things are basic it ties with technology because when it comes to food I , myself, even look online for food ideas daily . On to the second level which is safety needs , online many people sell “safety keychains” or even on amazon there are safety tools you can purchase for your house Alongside with purchasing tools to protect your apartment/house when living alone or the technology doorbells that many people have . Thirdly is belongingness and love needs and they consist of intimate relationships and friends. In today’s world most people meet over technology, rather it is dating apps or just social media . Thirdly is esteem needs which deals with the prestige and feeling of accomplishment . I feel as if it ties into technology because many people post their accomplishments on social media and I feel as if the nice messages give them a good feeling . Lastly is self-actualization and this in my eyes ties into technology the same way esteem needs does
Journal Five
After reading the article it has opened my eyes to many people with many different motives for committing crimes . With the seven motives given to me the motive that makes the most sense in my opinion is the political motive . The political motive had reasonings behind it and in my opinion it was “deep” in a way ; they had a point to prove . Secondly I would have to say the individual motive of recognition .Although this method is very bad and is the reason many parents need to watch after their children for hackers that just want recognition it makes some of the most sense to me . Thirdly I would rank the “multiple reasons” motive . Within the example it lists the many reasons why people are hackers and something that stood out to me is that some people are hackers because they are talented . Going forth is financial reasons , in a way I would put this first because oftentimes I do feel bad for people and say “ maybe they really need it “ however there is enough legal money in the world for everyone to survive comfortably. Fifth is boredom. It is really sick that people bully kids or stalk kids just because they are “bored”. Committing a crime that could lead a kid to death just because you may be bored is horrible. Six is revenge . Revenge is simply horrible and the crimes that people commit just to get “revenge” is selfless. Lastly I would list entertainment .
Journal Six
Some fake websites are very identifiable while others are not . For example fake websites may seem unreal but most fake websites are designed to scam you or simply clicking on the URL of the website can harm the device you are using . Starting with the URL of a website is a major way you can tell if a website is fake or not for example the URL would not contain “https”. Another red flag can be the design of a website , most poorly designed websites are scams . Websites that truly want you to spend your money with them will not just look bad because presentation matters . Always pay attention to the spelling and grammar on websites along with the reviews . My motto is if it does not have any reviews do not buy it nor trust it.
Journal Eight
The media is a major source of information on cybersecurity. It has the power to inform and educate people about the problem, and after seeing this movie, I’ve come to understand the different ways the media shapes our perceptions of cybersecurity. Their depiction of cyberthreats is among the most powerful methods. Television dramas and movies frequently give the impression that cyber attacks are constant and that we are in danger. Additionally, they make use of terms like “viruses” and “hackers,” but they don’t actually stress the problem more. People become anxious about something they might not experience as a result of this.
Journal Nine
After watching the video and also answering the questions about social media it opened my eyes towards social media in a way. It taught me when using social media how intentional and private you have to be . On the questions I scored 3 yes and 6 no , for a person my age who practically grew up with social media I feel like that is great . The questions on the scale were very interesting questions , it made me think and look at things differently because most times when using social media people do not think that they are addicted or even how addicted they already are to social media .
Journal Ten
From the article I feel as the military should be more up to date. I feel as the people in the military do not know much information about cybersecurity nor what they do . I say this because cybersecurity helps the military it helps to keep them protected in many ways. Cybersecurity analyst are the people that most military people can reach first . However I do feel as “social” cybersecurity puts a bad taste in their mouth and what I mean by that is they probably feel as all cybersecurity has to do with hacking when in reality that is only social cybersecurity.
Journal Eleven
Within this video, she is very transparent when it comes to the task of jobs as a cybersecurity analyst. As she stated starting in cybersecurity you will basically be a customer service help for cybersecurity. She suggest that you continue to enhance your technical skills because the good money is in bigger cities however the bigger cities requires more certification and experience . She also mentioned that to obtain these jobs your background has to be complete clear. While watching this video she also stresses the fact that you have to prepare to continue to learn because your income is based on your own certifications , she also mentioned that a degree is not needed to excel within this field however it could help in the long run.
Journal Twelve
The sample breach letter effectively draws a distinction between rational choice theory and laissez-faire philosophy. Individual data leaks were most likely caused by a laissez-faire attitude toward data as a commodity and a lack of legislation and enforcement regarding its safe keeping. The business even claims in the letter that they used a third-party provider who was compromised, which helps them avoid accountability. A proponent of rational choice might argue that the government would step in if a physical bank took the same decisions this corporation did, failing to safeguard customers’ assets. The corporation should be held accountable for its decision to not adequately protect the data .Customers assessed the value of the commodity they received against the possibility of having their information compromised, according to social exchange theory. The final section of the letter, which advises clients on precautions to take to keep themselves safe, is where influence theory comes into play.
Journal Thirteen
Asking yourself how you would break something if you had to is one of the best methods to determine its vulnerabilities. This is the main purpose of bug bounties. There is a lengthy history of bug bounty programs and the trusted professional testing of security systems. For as long as things have required to be kept secure, testing has been the only reliable means to find out if they were. This article studied the bug bounty market and found that it is a practical and affordable approach to test systems, allowing for testing without running the risk of compromise. If all else fail being able to state that your system has undergone professional testing gives customers more faith in the offering and can help the business financially by lending legitimacy and security to its operations.
Journal Fourteen
Before reading the article I had no idea that so many things were illegal while using the internet. As simple as using streaming services, using unofficial streaming services are illegal which surprises me. There are plenty of streaming services that thousands of people watch \ stream everyday . However the more serious illegal things would be for me starts with bullying and trolling on the internet. This is very devastating to me because many people struggle with identity issues already and most times social media makes it so much worse . Cyber bullying sometimes leads to self harm . Secondly is collecting information about kids under 13 . This is very scary because many kids use games careless because they simply do not know and these people take advantage of that and could end up harming or kidnapping them . Which brings up faking your identity online which is also illegal. Faking your identity online is very scary and that is because you persuade people you are one person but you are a totally different person . The last two illegal actions that happens on the internet that I picked are recording VoIP calls without consent and lastly sharing photos of others without their consent .
Journal Fifteen
I was excited to see Davin Teo’s TED talk video after watching it because I have a strong interest in the subject of digital forensics and wanted to learn more about his journey into it. I was so interested because someone closely related to me works in the forensic field and I never knew how closely our majors could align. To help them solve crimes, digital forensic investigators are proficient with electronic equipment, data collection and analysis, and the use of digital evidence technologies. The social, psychological, and behavioral components of crimes must be understood by investigators in order to solve them, so social sciences are important to the field of digital forensics.The first thing that caught my attention while watching is the data he discusses. We have discussed gathering data and its many approaches numerous times in this class.