CYSE 201S

Journal Entry/ Article Reviews

Journal Entry 1

After review the NIST Framework for Cybersecurity, one of area of study that stood out was Ditgial Forensics. Digital Forensics collects information so that is can be investigated. Not only does Ditigal Forensics plays an important role in cybersecurity but also in crime. Working close with law enforcement is always something I’ve been interested in, so it would be nice to add the technology portion to it. The area of study that I’m not so interested in is Systems Administration. Systems Administration is more offensive and mainly works with hardware and software.

Journal Entry 2
The principles of social science are relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. Relativism is the idea that everything is related, or a change in one system that can cause a change in another system. Relativism is related to cybersecurity because anything that changes in technology also makes changes in cybersecurity, for example education systems rely on technology more and more which means more cyber threats. Objectivity is the idea that everything is based on facts and knowledge without being bias. This is important for cybersecurity professionals doing research, to make sure all information is objective. Empiricism is very similar to objectivity, it’s about having the facts that you can touch, hear, see, smell, or taste. This is important in cybersecurity and cybercrime when conducting information such as forensics. Parsimony is the idea that everything should be kept in the simplest form so it’s better understood. If information is kept in the simplest form then it can easily be tested, which means that can help improve theories. Ethical Neutrality is the understanding that research conducted by scientist must follow ethical standards. This is important to cybersecurity because it determines how far a scientist can when conducting research, for example collecting too much data from individuals. Determinism is the idea the behavior is influenced by preceding events. This is important to cybersecurity because it can researchers better understand why someone commit crime and get down to the root cause.

Journal Entry 3
After reviewing PrivacyRights.org, there is a lot of publicly available about data breaches. The information of the website allows people to see the type of data breach, type of organization, and the number of data breaches since 2007. This information can be helpful for researchers because, researchers can spot trends and patterns in data breaches, including the most vulnerable sectors, popular attack methods, and the most commonly exposed data types. Understanding the changing perspective of cyber dangers can be helpful.

Journal Entry 4
Maslow’s Hierarchy need consist of self actualization, esteem need, belongingness and love need, safety need, and physiological need. All of these needs can be met somewhat through technology, I will go on to share how my needs are met. When it comes to self actualization, it the idea that achieving a creative goal, it met this need by writing notes with my iPad or keeping track of my goals on the notes app on my device. My esteem need is met by simply posting pictures on Instagram and receives nice comments from friends and family. My belongingness and love need is met by Facetime or sending my love ones gifts through Amazon. Safety need is met by having a Ring camera in the front and back of my house and by having a security system set up in my home. Lastly, my physiological need is met by ordering food through Doordash.

Journal Entry 5

I’ll be ranking the motives to commit them from 1 to 6, 1 making the most sense to 7 making the least sense. The one that makes the most sense is to make a political point, the more people you can persuade means more money. Secondly, committing a crime for money makes sense to me due to immediate needs someone may need in the moment. Third revenge, it’s a powerful emotional driver that can lead to actions done in anger or hurt. Fourth, Recognition this motivation may present itself in acts of popularity or celebrity. Fifth, entertainment this motivation could involve destruction, risky behavior, or other forms of ‘fun’ for the responsible. Sixth, boredom just because they are bored.

Journal Entry 6

The significant differences are the legitimacy of the URLs, the design quality, the authenticity of the information, and the general trustworthiness of the websites. In comparison to their legitimate replacements, fake websites frequently lack security measures, make unrealistic claims, have poor design, and provide not enough data.

Journal Entry 8

The media frequently publishes personal cybersecurity recommendations and guidelines, such as using strong passwords, enabling two-factor authentication, and exercising caution when exposing personal information online. People’s perceptions of cybersecurity issues can be influenced by how the media frames them. Stories that are politicized or overblown may instill panic or generate misconceptions about the seriousness of cyber threats.

Journal Entry 9

After reviewing the Social Media Disorder Scale, it shows that social media does have negative impact in my life. I often felt like I need a break from social media or effecting my mental health. I answered yes to most of the questions. I think the patterns are found across the world due to the huge influence on today’s society.

Journal Entry 10

After watching the YouTube video and the job descriptions, there was many social themes. Cybersecurity analyst identify flaws within a security network, some social themes like understanding social behaviors and the psychology perspective. Understanding cultural differences and recognizing how cybersecurity measures can be different across different regions and culturals.

Journal Entry 12

After reviewing 11 things Internet users do that may be illegal, there are five of them that are serious. The first one being faking your identity online, that can turn into more serious problems like online dating and etc. The second one being Bullying and Trolling, bullying can learn to sucide and other serious things happening to the victim. Third being Colllecting Information about Children, that’s a privacy issue. Fourth being using copyrighted images becauses that’s someone else’s property and it’s important to ask before. Five being Torrent servies.

Journal Entry 13

Davin Teo is Digital Forensic Investigator, he described what people think it and what it actually is. He think goes in and explain how data is used from in crime scences and how important it is. He talks about what’s done badly. He got into the field by starting into the accounting field and thought he would handle the IT part of it. He started when digital forensic was fresh and new, he thought it was cool and went for it.

Career Paper

Digital Forensics is the cybersecurity career path I’m looking to pursue after graduating with a Bachelors in Cybersecurity. Digital Forensics is the process of the process of gathering, examining, and archiving electronic evidence in order to investigate and address cyber incidents, crimes, or security breaches is.        

In digital forensics, researchers examine the online activities, communication patterns, and interactions of those implicated in cyber events. When properly examined, the digital evidence found on social media platforms can be a valuable resource for criminal investigations.  This information can be useful in identifying possible threat actors and predicting their behavior in the future. Investigators frequently must figure out people’s interactions with digital systems, their decision-making processes, and their degree of digital literacy. Creating events, spotting dangers from within, and evaluating the effects of cyber incidents on people and organizations all depend on these skills. Studies using digital forensics frequently take place in a particular social and cultural setting. Investigators can better understand digital evidence by applying social science methods to include legal frameworks, standard of living, and cultural norms. This is especially crucial in situations where there are multiple cultural contexts or global investigations.

In light of the COVID-19 pandemic, society has been forced to rely even more heavily on technology for basic daily needs, such as having access to basic goods, keeping in touch with others, working from home, and being able to finish schoolwork. This has made the role and importance of technology clear. Common challenges do arise within digital forensic such as device location, device type, and device interfaces. When comparing a suspect’s photo to mugshots and driver’s license photos, police utilize facial recognition technology. As of 2016, it is projected that about 117 million adults in the United States had photos included in a network used for facial recognition. An increasing collection of studies reveals varying mistake rates between demographic subgroups, with Black, female, and 18–30-year-old subjects generally showing the lowest accuracy. Studies show the accuracy of face recognition is lower among a darker female rather than a lighter female. Face recognition technology may also be used to target other oppressed groups, such as Muslim citizens by the NYPD or undocumented immigrants. Self-censorship and refraining from activity out of fear of penalties are two behavioral shifts associated with surveillance; face recognition technology, for instance, was used to track and identify Black Lives Matter demonstrators.

 In conclusion, digital forensics methods can be applied by social scientists to examine digital evidence for their studies. This might entail looking into social media interactions, online communication trends, and personal digital footprints.