Week 1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
There is one role of the NICE Workforce Framework that I would potently like to focus my career on. This role is Design and development. I chose this work role because it seemed to agree with what I want my primary focus in Computer science to be which is in the background working on the structure and programming of what is being made at the time. For the work role what appealed to me was the secure software development role as I would be running tests on the security system while also being responsible for its development, which to me sounds like my type of job as I like hands on work.
Week 2:Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?
The principles of science relate to cybersecurity because the principles are used in the framework for cybersecurity all the time. When it comes down to paying attention to every detail, not having your own beliefs take over the way you work, or you questioning every method shown to you to fix something data wise, the principles of science are there being used. For example, when it comes to a cybersecurity analysis they have to try to think is this a strong defense against malicious code, or will the data be safe even if we move it to a new server. That is an example of Skepticism where you have to question every claim and examine it further.
Week 3:Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
When it comes to using this website to study breaches. Researchers would most likely use the data to get accurate and factual information on breaches. These areas of the website are helpful for research for example, the data breach chronology tab gives data on previous and current breaches that have taken place in the U.S. So researchers could use this information to get a better fix on what is more susceptible to an attack and what is not. Another is the data brokers section of the website which is explained in the name which is a large list of data brokers and their emails. The Researchers could use this to get into contact with a few to learn more about certain data breaches that have occurred over the years from their perspective areas.
Week 4:Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.
When it comes to Maslow’s Hierarchy of needs and my experiences with technology they both go hand and hand. For the first need and example of this is using the weather app on my phone to see if it is going to be hot or cold outside. For the second need I have a a ring security set up at my home which sends alerts to my phone if someone has set the alarm or at the door. The third need I use social media to keep in touch with some family and friends. For the fourth need I had a YouTube channel were I wanted to post fun videos of my experiences playing games and what I did in the real world. For the final need it also pertains to me using technology to make my own 3-D designs to that I could print them for a class.
Week 5:Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
I believe that the motives from most sense to least would be. 1. Multiple Reasons- as you would have many different motives that would drive your crimes. 2. For money- you would try to make a successful career off the skill you have so you would do this to have a better life. 3. Revenge- someone could have wronged you so that normally gives someone the drive to take revenge and ruin their targets: life, status, or career. 4. political- because some of the motives may be biased or not depending on the stance that the cybercriminal is following so it might be good or bad. 5. Recognition- just doing something horrible to another person or just causing a cybercrime in general to get attention is by far a bad motive to commit said crimes. 6. Entertainment- because you enjoying something going wrong or someone’s life being ruined because of your actions and not feeling bad at all is never a good reason and does not make sense at all. Lastly 7. which is boredom- just randomly choosing to commit a cybercrime because you are bored makes absolutely no sense at all and it is a very questionable reason to do anything.
Week 6: Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent
The three different websites I found are: Amazon, Wells Fargo, and PayPal
Amazon- Fake amazon websites tend to have altered URLs that take their victims to a very similar copy of the sight there are many different versions of said URL. Ex: “amzon”, “ama-zon”, “amaz0n”. There is also the “https” to look out for as the fake URLs might contain just “http” as the “s” in the legitimate websites stand for secure. The real URL is spelled correctly and the link starts with “https”.
Wells Fargo- The fake Wells Fargo uses the same methods as other fake websites by sending an email to the target which sends them to a fake website so that they can log into their Wells Fargo account. You can tell that it is fake as the this is a very different sign in scree from what is normal and the title says ” theusawebdevelopers.com” instead of “wellsfargo.com”
PayPal- PayPal is done the same way as Wells Fargo as you have Hackers sending multiple phishing emails to people and gives them a link that sends them to a fake log in screen with a altered URL name, Ex: “pay-pail.com”. The real log in screen however looks different as the login screen as for your email or phone number and then on the next screen asks for your password.
Week 7:Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
1. This meme shows how this person is trying not to show any personal information so they are trying to cover their face so that it won’t be shown anywhere random because of the picture.
2. This picture relates as it shows one person playing in the snow while not paying attention to the other person taking a picture which in the end might put their private life and security at risk as the person taking the picture did not think to ask for the others concent.
3. In this picture relates to human-centered cybersecurity because it clearly shows them trying to either fix or work on something which could be security related that is why I made the meme this way as the friend would be helping the victim with fixing their security after they had clicked on a link that might have put their security at risk.
Week 8:Watch this video and pay attention to the way that movies distort hackers. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site.
After watching the video given I grasped that media has greatly influenced the way people see cybersecurity. This is clearly shown through the various TV shows and movies that demonstrated multiple types of hacking and how Ms. Elazari explains the accuracy of the movies and shows shown. From what the video has shown there seem to be real skills and terms used in the media that relate to hacking in some way and because of that it does tie into how someone would look at hacking in general. For example, in Fast and Furious movie that is shown with the hackers taking control of all the cars how someone would believe hacking is done in real life even though it is not possible to do it with cars as of right now it will potentially be possible in the future as cars become more technologically advanced. So because of that I believe media does have a significant impact on how people see cybersecurity and hacking.
Week 9: Watch this Video: Social media and cybersecurityLinks to an external site.
Complete the Social Media Disorder scale Download Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I scored a three out of nine which indicates risky usage. I feel as though these items do a great job of determining how much time a person puts into social media building up their presence. Through each item you can easily see what level of social media disorder you have which in turn can better help you to understand if you need to limit or just cut off your connection to social media. I believe that different patterns are found across the world because of how everyone is exposed to social media so depending on how a person is raised that might change the pattern of how they use social media in the long run, so someone can be fully involved in it while others just choose to use it lightly or not at all that’s why different patterns are found.
Week 10: Read this and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/bLinks to an external site.
In this article it talks about social cybersecurity and how it is an emerging national security requirement. The article informs use of this as they cover multiple points about this and the impacts it will have on people, examples being: Tech-Enabled Manipulation which is the decentralization of information through social media. From what is explained social cybersecurity is something that is used to protect societies from cybermediated manipulation while its overall goal is to safeguard peoples perception, trust and societal stability which in turn can be used improve people lives over time while keeping them protected. That is my overall response to the article .
Week 11: Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
Social themes that I noticed while watching the video was when we started learning about networking as getting to know your community will better help the chance of you landing a job in your field. Another social theme was to figure out where you would want to live when it came to finding a job as a cybersecurity analyst. This is really important as every place has a different type of atmosphere that can either fit your personality and comfort or not so making that chose is really important. Some more social behaviors is getting certifications and degrees to build up your knowledge and your profile to make you more appealing which you can eventually incorporate into your resume. These social behavior’s are important when it comes to wanting to be an cybersecurity analyst as they all play a role in obtaining that entry level position.
Week 12: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological social sciences theories relate to the letter.
When it comes to the letter the two economic and social science theories that relate to it are: Rational choice, Marxian economic theory, Social contract theory, and Functionalism.
For the economic side I chose Rational choice, and Marxian economic theory because the company made a rational choice which was to inform their consumers about the situation at hand because it would have had a negative affect on them if they did not inform the consumer. For Marxian economic theory it shows how the people with power the hackers are trying to exploit all of the consumers by taking their information from the company they hacked.
For the social science side I chose the Social Contract theory, and Functionalism. Social contract theory is shown in this letter as the social contract between the company and its consumers is now violated as they could not keep their consumers information safe from the the malware being in their systems, so now the trust is broken between the two. Functionalism is shown in this letter as the company is working with the authority’s and a leading cybersecurity firm in order to combat the situation in front of them while also giving the consumers advise on what to do while they handle the situation.
Week 13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
In the article presented it goes over bug bounty programs, which use freelance security researchers to discover vulnerabilities in corporate systems. The article explains that hackers are case sensitive and that means that companies can benefit from these programs even if they have a small or limited budget. The article also explains that finance, retail, and healthcare companies receive fewer or little vulnerability reports that other industries and this possible because they exploit there data for a profit. So bug bounties seem to be an effective tool in the cybersecurity field however there are more things that can happen along the way that might either effect for the good or the bad.
Week 14: Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
From the eleven violations shown I believe the five that are the most serious. Sharing passwords, addresses, or photos of others which can cause serious problems for the person who’s personal information was leaked as they could be put in danger by being stalked, burglarized, hacked, and have all their personal information used by someone else. Bullying and Trolling can be just as bad as the person being bullied could start to separate themselves from society or make them go into a depression and try to hurt themselves . Faking Your Identity Online is very illegal especially if you use a fake identity to negatively effect someone else by taking credit cards out in their name or by making a claim somewhere pretending to be that person which could defiantly ruin their lives. Collecting Information about Children is not only illegal but it violates the Children’s Online Protection Act (COPA). It is important that a child’s information is kept private as they could be susceptible to being taken advantage of and having their information being used for scams. Illegal Searches on the Internet are just as illegal as there are thing on the internet that is illegal to search up such as how to make certain weapons, how to get into a government server or facility illegally, or worse child pornography.
Week 15: Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site. https://www.youtube.com/embed/Pf-JnQfAEew?autoplay=1&rel=0&hl=en_US&fs=1: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
The career of Digital Forensics investigators relate to social sciences in many ways as Davin Teo showed during his ted talk was that in his line of work being a Digital Forensics investigator is not about just analyzing data, but also interpreting the person behind the evidence shown. The social sciences that revolve around psychology, criminology, and sociology help provide an understanding of the implications of digital evidence. In doing so the investigators might be able to analyze the social networks, and narratives that will help. The human approach ensures that digital forensics investigators can delve deeply into human interactions that cause problems in their field of work.