{"id":295,"date":"2025-09-18T21:33:39","date_gmt":"2025-09-18T21:33:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/?page_id=295"},"modified":"2025-12-04T21:45:21","modified_gmt":"2025-12-04T21:45:21","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #1:<\/span><\/strong><br>The areas that I wanted to focus my career on were Artificial Intelligence (AI) Security, Cloud Security, and Operating Systems (OS) Security. I chose these three areas because they are swiftly developing, highly impactful, and central points to the modern digital infrastructure. They all share a common purpose of securing both digital environments and technologies that support information technology, which requires technical capability, a dynamic approach to evolving threats, and mutual dependence on the principles of core security. In other words, these three areas are highly valuable because AI security is crucial for the future, Cloud Security is necessary for securing the core of the modern IT infrastructure, and OS Security provides both basic knowledge and broad suitability.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #2:<\/span><\/strong><br>The principle of empiricism enhances the effectiveness of cybersecurity practices because it bases cybersecurity in the real-world, which makes security measures more responsive, effective, and resilient. For instance, when cybersecurity professionals both analyze and collect empirical data, they can anticipate early emerging threats, validate the current defenses based on actual performance, and innovate the security strategies informed by the real-world evidence rather than theories. In other words, since this scientific approach emphasizes knowledge that is gained through observation, experience, and data to enhance cybersecurity practices, it makes it highly necessary for a greatly evolving digital threat environment where unchanged theoretical methods fail.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #3:<\/span><\/strong><br>Researchers use the information about privacy rights to better understand the causes and patterns of data breaches by inspecting what specific rights, such as the right to data reduction or data access are most often violated. This helps to highlight the areas of vulnerability. Researchers use this technique to build anticipating models, factoring in oversight effectiveness, industry practices, and user behavior to speculate both where and how future breaches might occur. It also helps to explain how well individuals both know and exercise their privacy rights offer insight about how user behavior leave an impact toward data security. In other words, researchers can analyze both past incidents and early warning signs for emerging threats.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #4:<\/span><\/strong><br>In Maslow\u2019s Hierarchy of Needs, each level relates to my experiences with technology. For instance, the level of psychological needs is the basic life in sustaining needs like food, water, and shelter. This relates to my experience with technology because I use food delivery services like DoorDash and Grubhub for easier accessibility for food, and a fitness tracker to help monitor my exercise and hydration routines. The level of safety needs refers to the protection of harm, and both personal and financial security. This relates to my experience with technology because I use two-factor authentication for my accounts for a safer digital experience to prevent interactions with any data breaches. The level of belongingness and love needs contributes to friendships, relationships, intimacy, and a sense of connection. This relates to my experience with technology because I use apps like Instagram and FaceTime to chat with friends and family to keep me emotionally connected. The level of esteem needs contributes to respect, self-esteem, achievement, and recognition. This relates to my experience with technology because I posted a YouTube video, and received several comments that were highly complimenting, which gave me a good sense of achievement. Finally, the level of self-actualization refers to achieving one\u2019s full potential, creativity, and personal growth. This relates to my experience with technology because when I first learned how to make a video game back in middle school, it encouraged me to pursue that activity and choose to major in Game Design in college today.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #5:<\/span><\/strong><br>My ranking for the motives that make the most sense to the least sense are for money (1), multiple reasons (2), political (3), recognition (4), curiosity (5), entertainment (6), boredom (7), and revenge (8). Money is first because it is the most common factor in human society and people need it for comfort, survival, power, and opportunity. Multiple reasons is second because human behavior is defined by multiple reasons, such as either money and recognition, or curiosity or boredom. Political is third because political motives are based on people\u2019s beliefs about society, justice, freedom, and identity. Recognition is fourth because it explains everything from social media behavior to performance, competition, or the criminal acts that draw attention. Curiosity is fifth because it drives learning, exploration, invention, and sometimes trouble. Entertainment is sixth because people tend to act out based on their desire to amuse themselves, such as trolling, creating prank videos, and doing risky stunts. Boredom is seventh because it explains behavior, but lacks more of a purpose than a clear reason. Finally, revenge is eighth because it causes more harm than good, which makes less logical sense.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #6:<\/span><\/strong><br>Based on the video, the human firewall refers to authorizing and training individuals to act as a forward-thinking defense against cyber threats by both recognizing and responding to social engineering and phishing attacks that avoid technical safeguards. This term contributes to the biggest risk of cyber threats because it acts as a necessary precaution towards these threats, particularly the exploitation of human trust and behavior. For instance, the cyber threats of risk that the video refers to are phishing, human error, and impersonation. For example, phishing refers to tricking individuals, particularly employees into clicking unsecured links or revealing credentials by deceptive emails. Impersonation refers to manipulating employees by impersonating a trusted authority, such as a CEO or IT staff, only to either gain access or steal data. Human error only occurs when individuals use weak passwords or improper setups. In other words, what I think about the human firewall is that it is a great aspect of cybersecurity because it helps to better recognize current or incoming threats whether it is through email, communication, or any other form of suspicious activity. It is also beneficial to help individuals improve their trust in the digital environment and become more active towards cyber threats.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #7<\/span><\/strong>:<br>The photos that I have chosen were photos #7, #14, and #18. For photo #7, the meme is, \u201cMy company\u2019s cybersecurity strategy: \u2018Just throw more hardware at it!\u2019\u201d For photo #14, the meme is, \u201cHuman-Centered Cybersecurity: Recognizing that the biggest firewall is informed people, not just blinking lights.\u201d For photo #18, the meme is \u201cMe: Trying to work securely from a coffee shop, while also needing to meet deadlines.\u201d In other words, these memes highlight the disconnection between the solutions of both cybersecurity and human nature. For instance, the first meme represents a high-tech, but somewhat an inexperienced approach. The second meme shows both the individual struggle and risk that associate with the work habits of the real-world. Finally, the third meme introduces the idea of human-centered cybersecurity as the solution that emphasizes that people are fundamental to security.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #8<\/span><\/strong>:<br>After watching the video, I think that the media influences our understanding about cybersecurity in both a positive and negative way. For instance, it raises awareness by encouraging both individuals and businesses to approve safer online behaviors, such as using the two-factor authentication system. It influences the debate of both policy and the public because the media determines which cyber issues draw attention that impact the topic based on what the public and policymakers view as the most urgent. However in a negative way, it can spread some misinformation, such as social media raising false information about cyber threats, scams, or government-related issues. In other words, cybersecurity helps influence our understanding about its purpose because it informs us about threats, shapes the public behaviors, and frames how we perceive hackers and risks.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #9<\/span><\/strong>:<br>My score on the Social Media Disorder Scale (SMD) scale was a 2 out of 9. It\u2019s considered a risky usage, but it isn\u2019t generally too bad because it is still a lower score based on my usage. When thinking about the items in the scale, it is usually just a reflection towards how social media affects certain aspects of your life, such as personal relationships, daily functions, self-regulation, and other social connections. However, the patterns of this scale differ across the world due to the factors of culture, society, and technology. This means that social norms generally impact how much use of social media is considered too much, but some variations in both network access and platform status form actions and beliefs. In other words, this scale emphasizes that the problematic use of social media is both a psychological and cultural circumstance, which varies based on its impact towards societies.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #10<\/span><\/strong>:<br>This article\u2019s purpose is to review the diverse techniques that are used to detect social cybersecurity threats to define both the current challenges and future directions for research in this rapidly evolving digital environment. The survey uses detection techniques that involve the use of discrete models, which focuses on both structural representations and logical relationships for threat analysis. This includes Attack Graphs, Markov Models, and Bayesian Networks, which all help in visualizing the potential attack paths and capturing the evolutionary trajectory of attacks. In other words, the survey of this article functions as a reliable resource for researchers by providing a structured framework of approaches and tools to help build a safer digital environment against threats that can potentially exploit both human and social weaknesses.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #11<\/span><\/strong>:<br>Even though cybersecurity is a technical field, it is entirely tied to human behavior. This is because its effectiveness not only depends on both systems and software, but also on the decisions, actions, and habits of people. For instance, cybersecurity analysts study the patterns of social behavior to design better digital safeguards when security breaches occur due to human error, such as clicking on phishing links and using weak passwords. They must discuss security risks to staff and promote a more security-based approach towards a mindset of digital safety, which requires empathy, persuasion, and an understanding of workplace conduct. Analysts must also understand the social behaviors of trust, fear, and curiosity to both predict and prevent attacks from hackers that use psychological or social ways to trick individuals into revealing information. In other words, social themes, such as trust and communication arise when examining this role because being a cybersecurity analyst applies to not only securing systems, but also individuals, particularly their actions, decisions, and relationships.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #12<\/span><\/strong>:<br>The first economic theory related to the sample data breach notification is the \u201cinformation asymmetry\u201d because it highlights the unbalance in the issue of knowledge between the company and its customers. The second economic theory related to the sample data breach notification is the \u201cprincipal-agent theory\u201d because based on this case of a data breach, the company could be held accountable for the demeanor of its agents, such as employees or contractors that manage the company\u2019s data. However, the first psychological social science theory related to this sample data breach notification is the \u201ctrust theory\u201d because both the data breach notification, and how a company handles the situation can directly influence customer trust. The second psychological social science theory related to this sample data breach notification is the \u201csocial identity theory\u201d because customers\u2019 acceptance or bond to a company can be affected when a breach occurs. In other words, a data breach notification is not just both a legal and operational requirement, but also a significant psychological and operational event that can affect both the company and its customers.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #13<\/span><\/strong>:<br>This article makes an important effort by treating bug bounty policies, particularly the bounty size, visibility, and response speed, all as economic measures that form the supply of risk reports. The way the authors use their approach of how they drafted bug bounty programs highlights that policies can influence participation, especially when hackers are price insensitive. It also emphasizes the insight that smaller companies can still interest high quality reports without offering massive payments. However, this article restricts policy to both financial and operational factors by overlooking the broader system of rules that manage hacker engagement, such as compliance safeguards, scope transparency, and communication practices. In other words, the article\u2019s economic composition incorporates these policy elements to provide a more complete understanding of how bug bounty programs function in practice.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #14<\/span><\/strong>:<br>Based on Andriy Slynchuk\u2019s perspective describing the eleven things that online users do illegally, the five most serious violations out of the eleven in my perspective are \u201ccollecting information about children,\u201d \u201cfaking your identity online,\u201d \u201csharing others\u2019 passwords\/addresses\/photos,\u201d \u201cillegal searches on the internet,\u201d and \u201crecording a VoIP call without consent.\u201d All five of the violations that I\u2019ve mentioned are remarkably dangerous because of the harm that they can cause. For instance, collecting information about children, particularly those under age 13, violates protections like COPPA, and can expose them to both security breaches and online child sexual abuse. Faking your identity online, most commonly considered \u201cfraud,\u201d can enable either deception, manipulation, or even financial crime, all of which makes it a serious crime towards both individuals and society. Sharing someone\u2019s passwords, addresses, or photos are all effective ways to expose their private information, which can most likely lead to harassment, stalking, and especially physical harm. Illegal searches on the internet are seriously alarming because they can provide bad people to carry out real-world crimes, such as seeking instructions to commit violent or illegal acts. Finally, recording VoIP calls without consent breaches privacy rights, and can violate the laws of electronic communications or wiretapping. In other words, each of these five violations all sabotage personal safety, trust, and legal protections, which is why I consider them to be the most serious.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><span style=\"text-decoration: underline\">Journal Entry #15<\/span><\/strong>:<br>After watching the video, it raised a few questions for me based on trust, accountability, and misinformation amplification. The first question is \u201cIf AI can perfectly imitate a person\u2019s voice, appearance, and communication style, how can we establish trust in digital interactions, and what standards should define reliability?\u201d This is because the ability to create convincing illusions compromises our reliance on visual evidence, which threatens the public trust of media, politics, and personal communication. The second question is \u201cWhen AI systems are utilized to carry out criminal activities, such as both fraud and ransomware, who carries the responsibility for the harm caused, the user, the AI developer, or the system itself?\u201d This is because the video highlights how easily AI can be manipulated to bypass the ethical guidelines, which suggests a major difference in the accountability structure. The third question is \u201cBecause AI models learn from data that can contain implicit biases, how can we prevent AI-powered systems from either reinforcing societal biases or enabling widespread disinformation?\u201d This is because simulations of public figures demonstrate the potential for AI to cause both political disruption and social chaos. However, I think society should address these concerns by implementing digital watermarking, promoting human firewalls, and teaching verification practices. For instance, implementing digital watermarking is the first solution because it allows users to trace the history of media to verify that it came from a claimed media and hasn\u2019t been changed. Promoting human firewalls is the second solution because society must prioritize cybersecurity awareness for the general public to make it engaging. Teaching verification practices is the third solution because establishing either non-digital codes or security questions for sensitive communication is highly recommended for protection against voice, financial, or personal scams.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry #1:The areas that I wanted to focus my career on were Artificial Intelligence (AI) Security, Cloud Security, and Operating Systems (OS) Security. I chose these three areas because they are swiftly developing, highly impactful, and central points to the modern digital infrastructure. They all share a common purpose of securing both digital environments&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":31324,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/users\/31324"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages\/295\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/media?parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}