Week 1 – Journal Entry 1– Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
I would want to focus my career more on the Implementation and Operation (IO) side. This area appeals the most to me because it includes work roles that directly involve building, protecting, and maintaining an organization’s infrastructure. Additionally, with new technologies constantly rising, organizations will continue to need skilled professionals in Implementation and Operation, making this area one that will continue to grow. Personally, the Oversight and Governance (OG) side appeals the least to me due to its administrative focus rather than hands on work. This area feels less engaging for me because I prefer a more technical role where I can actively solve problems and work with systems.
Week 2 – Journal Entry 2- Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?
The principles of science like empiricism, determinism, parsimony, objectivity, and skepticism relate a lot to cybersecurity. Empiricism uses data and observations to figure out what’s going on, this helps us with future cyber dangers or testing defenses. Determinism helps us understand cause and effect. We ask questions to so see how cyber attacks might happen and try to stop them before they do. Parsimony just means keeping things simple. Making things understandable for user so it’s not complicated. Objectivity is about staying unbiased so we can make fair and accurate decisions. Skepticism is what keeps us questioning everything (double checking) and critically examining rather than just falling for false information. These principles help us stay on task and are effective in protecting systems and data.
Week 3- Journal Entry 3- Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
Researchers can use the information on PrivacyRight to study data breaches by analyzing details like the type of breach, what was affected, and the kinds of data that was exposed. The site lets you filter by year, location, and more, which makes it easier to spot patterns over time or seeing if these patterns are in certain areas. By looking at the causes of breaches, like hacking, victim’s behavior, employee mistakes, or lost devices. Researchers can figure out where these vulnerabilities exist and how to prevent them for the future. Plus, the database includes things like notification letters, incident summaries, and reports which can help researchers study how breaches impact people and how effective current laws and policies are in addressing these issues.
Week 4 – Journal Entry 4– Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs ties into my personal experiences with technology in many ways. At the basic level, I use apps like DoorDash to order food when I’m too busy, and my smartwatch helps me track my sleep and exercise. For safety, I rely on things like Due Mobile and antivirus software to keep my accounts and devices secure at all times. When it comes to belonging, social media platforms like Instagram or TikTok help me stay connected with my friends and family, even with the distance . For esteem, WordPress lets me share my achievements and feel proud of my work. Finally, for self-actualization, I use creative tools like Canva or blogging platforms to express myself and work on personal projects. Technology supports me somewhat at every level.
Week 5 – Journal Entry 5- Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
People commit crimes for a bunch of reasons, but some are more common than others. I think money is the number one motive for crimes. Lots of people steal or scam just to get cash. Second is revenge because some people do bad things because they’re mad at someone which is often. Political motives come next, since politics is such a big thing, where people commit crimes to make a statement or push an agenda. Next is recognition since people commit crimes just to get famous. Others do it for entertainment, just to get that excitement. Boredom is another reason, some people act out just to kill time. Finally, there are often multiple reasons mixed together.
Week 6 – Journal Entry 6– Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.
Fake websites are often noticeable due to several key features. One major indicator is the URL, where fake sites often misspell words, such as “pay-pail.com” instead of “paypal.com.” Legitimate sites typically have well-written content with proper grammar and spelling, while fake sites contain errors. Additionally, fake websites may create a sense of urgency or use generic greetings to prompt quick action. They often include suspicious links or attachments. So, always double-check the URL and look out for these signs. It’s really important to be careful and not fall for these tricks, as it can save you a lot of trouble.
Week 7 – Journal Entry 7- Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
He’s enjoying the sunset while working outside, but he’s screen is visible to hackers. Remember to use a privacy screen for outdoors too. You never know whose eyes are lurking around to get information.
She’s focused on enjoying social media but not realizing she might be sharing personal information. Hackers often monitor social media for personal details or even clues to security questions. Be mindful of what you post and how much you share.
Everyone is focused on the slideshow, not noticing that there’s a glass wall behind them and their computers are open towards it. It’s important to keep meetings closed when sharing important data or news. This ensures that sensitive information is not visible to outsiders, as someone could be looking through the glass.
Week 8 – Journal Entry 8 – Watch this video and pay attention to the way that movies distort hackers.Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site.
Media like movies and tv shows, have a big influence when it comes to how we view cybersecurity. Some media’s often makes cyber attacks seem more serious and way out of control then what they are. Movies and TV shows make hacking look easy, creating myths about how attacks happen and are stopped. Some media focuses on getting attention rather than explaining things clearly, which leads to misunderstandings. Despite these pictures not being accurate, media coverage has made more people aware of privacy issues and interested in cybersecurity jobs. Media also educates the public about cybersecurity, affecting how we think about digital safety.
Week 10 – Journal Entry 9 -Watch this Video:Social media and cybersecurityLinks to an external site.Complete the Social Media Disorder scale Download Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
Based of the social media disorder, I scored a 3/9, which falls into the risky usage category. This suggests that my social media habits aren’t yet problematic but there signs that I might be spending too much time on social media and neglecting other activities. The items in the scale asks great questions to identify behaviors associated with excessive social media usage. The scale is simple but also effective with identifying what might be the problem when it come to over social media usage. Different patterns emerge around the world due to economic and societal differences. Im allowed to use my phone more often than others in different countries because of where I live. Its about knowing when to stop excessively using social media.
Week 11 – Journal Entry 10 – Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.
The article on social cybersecurity explains how technology is being used to manipulate people and the public, shifting the focus from hacking systems to influencing their thoughts and behaviors. Social media has made it easier for misinformation and disinformation to spread quickly, creating division and distrust in open societies. Techniques like spreading false stories, taking over conversations, and manipulating online groups are used to weaken the trust in organizations and disrupt society. The article talks about the need for a multidisciplinary approach, using technology, psychology, and social science, to counter these threats head on. Social cybersecurity is seen as a crucial part for protecting society in today’s digital age, where information warfare is becoming a more powerful and reoccurring thing.
Week 11 – Journal Entry 11- Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site., think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
Nicole Enesse’s presentation talks about how the job of a cybersecurity analyst ties into social issues like trust, teamwork, and how much we as a society depend on technology. Cybersecurity analysts help build trust by keeping online systems safe from hackers and other threats. They work with different teams to find and fix different security problems, making working as a team a big part of the job. As technology becomes a bigger part of our lives, the need for cybersecurity experts keeps growing. This shows how important it is for people to learn security skills and work together to stay safe online. Their role is crucial for maintaining online safety and security.
Week 12 – Journal Entry 12- Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different psychological sciences theories relate to the letter.
Based on reading the sample data breach notification letter this can be analyzed through economic and psychological theories. Classical economic theory relates to this letter because customers willingly shared their personal information during transactions, but the platform provider messed up by not securing it, disrupting trust. Marxian economic theory relates to the letter showing how corporations exploits consumers who lack control over their data, leaving them vulnerable to identity theft while the corporations keeps profit. From a psychological perspective the letter prompts users to take protective actions like contacting their banks which can relate to behavioral theory. Cognitive theory addresses emotional responses which in the letter they help giving clear instruction helping mange stress.
Week 12 – Journal Entry 13- A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
Bug bounty policies are a smart way for companies to improve cybersecurity without spending a ton. They pay ethical hackers to find weaknesses in their systems, which turns out to be cheaper than other methods. The literature review shows that its a win either way, companies get safer systems, and in return hackers earn money and recognition. However, the findings also point out some issues, like making sure the rules are clear and hackers are paid fairly. Even with those challenges, these programs encourage teamwork and help companies fix problems before they become big threats. Overall, bug bounty policies are a more practical and cost-effective way to enhance cybersecurity and stay ahead.