course material

journal entry week 1

The area that I would probably focus on would be protect and defend because it is the most fascinating area of cybersecurity to me. mainly cyber defense analysis. that is a place where cyber professional Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. I think in the future cyber attacks are going to increase immensely because more and more systems are becoming tech related.
oversee and govern might be the least appealing to me because at where I am right now I don’t think I would would have the ability to manage a group of people. I don’t
think I can order some one to do some kind of work that I could do my self but I think this issue will change overtime. oversee and govern might be my least favorite career right now but I think in the future I might like it more.

journal entry week 2

It relates to cyber because many types of sciences are used with tech which apply to cyber security. For example health care systems and educational systems are mostly run online so they are vulnerable to cyber attacks. also understanding cybersecurity through a social science lens requires that we recognize how broader technological changes influenced behavioral dynamics, economic decisions, policy making, and social processes.

journal entry week 4

Researchers can use the information to conduct in-depth studies on data breaches, focusing on the practices of data brokers and the effectiveness of regulatory frameworks. By analyzing specific cases like the Equifax data breach, researchers can assess the real-world impact of these incidents on individuals and organizations. The existence of state-level legislation, particularly in Vermont and California, provides an opportunity to evaluate the efficacy of data broker registration laws and their influence on industry practices. Researchers may investigate consumer awareness regarding data breaches and the role of data brokers, aiming to understand public perceptions and potential areas for education.

journal entry week 5

Maslow’s Hierarchy states 5 needs which are Physiological Needs, Safety Needs, Love and Belongingness Needs, Esteem Needs and self-actualization. A way these need relate to me through technology are the following:

1. physiological needs: Technology enables access to resources like food, water, and shelter through online shopping and delivery services. which I use frequently meaning it provides essentials for physiological needs to be met.

2. safety needs: It enhances safety and security through home security systems, surveillance cameras, and cybersecurity measures. even though danger could come from tech it also largely protects us from many types of harm.

3. Love and Belongingness Needs: Social media platforms, messaging apps, and online forums facilitate social connection and relationships. which almost every one uses to connect with friends and family.

4. Esteem Needs: this need don’t really connect to tech because I don’t think it has anything to do technology because it is an in person thing. to experience esteem need you need to believe in your self and abilities.

5. self actualization: the ability to check blood pressure or how many steps you took for the day on your watch can be factored in as the use of tech towards self actualization.

journal entry 6

Fake Websites:

“DiscountEmpire.com” Poorly designed layout, low-quality images, limited contact information, and suspicious URL.

“WorldNewsTodayFake.com” Sensationalized headlines, lack of credible sources, numerous errors, and promotion of conspiracy theories.

“InvestmentMasterScam.com” Unrealistic investment promises, lack of transparency, fake testimonials, and urgency tactics.
Real Websites:

Real Retail Website:

“Amazon.com” Professional design, high-quality products, clear contact information, and genuine customer reviews.

“BBC.com” Reputable journalism, credible sources, editorial distinction, and adherence to standards.

“Investopedia.com” Educational content, expert authors, transparent information, and avoidance of investment advice.

journal 8

many movies make it look like hacking is the easiest things to do, but in reality hacking is verry hard and time consuming. like the women in the video said, hacking in movies are unrealistic and happen in a few minutes. from what she said, hacking is not always shown fairly in movies because it will make movies look very lame, so movie producers often use face hacking systems to show in their movies.

journal entry 9

my score was 3 yes and 6 no.

I believe the items in the scale provide a overview of what an individual is thinking when the go to the process of the scoring test.

I believe that different patterns are found across the world is because of human nature and the connection of peoples across the world. if one type of behavior happens in this part of the world it is likely that it will happen in other parts of the world.

Article review #1

Mitigating Ransomware Risks in Manufacturing and the Supply Chain.
The Research article aims to investigate the correlation between employee training, awareness,
behavior, adherence, and the overall security posture within a business, specifically focusing on the
manufacturing and supply chain sectors.
The introduction of the research article talked about the importance of comprehensive security
measures in safeguarding against cyber threats, such as ransomware attacks, in organizational settings.
It emphasizes the role of various elements, including individuals, procedures, and technologies, in
establishing a strong defense against cyber threats. The primary goal is to understand the various factors
that contribute to mitigating the risk of ransomware attacks within the context of manufacturing and
supply chain industries.


Hypothesis and review: the relationship between employee training, awareness, behavior, adherence,
and security posture. It presents hypotheses regarding the mediating role of employee behavior and
adherence in the relationship between training and awareness, technological solutions implementation,
supply chain resilience measures, collaboration, and information sharing practices, and comprehensive
security posture.


Reliability Testing: in the research it shows Various statistical tests are employed to ensure the
reliability and validity of the collected data. This includes assessing factors like Cronbach’s alpha
coefficients for internal consistency, average variance extracted (AVE) values for convergent validity,
and discriminant validity analysis to ensure that different constructs are distinct from each other.


Data sampling: is one of the main pieces of evidence used in the research including data collection
procedures and sampling techniques. It mentions distributing a questionnaire to “246 employees” from
various companies in Saudi Arabia, focusing on the manufacturing and supply chain sectors, to gather
data on ransomware risk mitigation. And the other main research talked about was discriminant
validity; Analyzes discriminant validity to ensure that the measurement model can effectively
distinguish between different constructs related to ransomware risk mitigation, such as comprehensive
security posture, employee behavior and technological solutions implementation.


A research method this Research article used is mainly case study. Case study is a research method that
involves an in-depth examination of a specific real-life situation or instance. It typically involves detailed
analysis and documentation of events, actions, and outcomes related to a particular phenomenon,
problem.


In conclusion the research paper provides a strong structured approach to investigating the factors
influencing ransomware risk mitigation in manufacturing and supply chain organizations, with a focus on
the role of employee behavior, training, and support in enhancing overall security posture.

Article review #2

Cybersecurity and the digital workplace (in Iraq)

Relation to Principles of Social Sciences
The topic of organizational cybersecurity in the context of the digital workplace relates to various principles of social sciences. It combines aspects of organizational behavior, human psychology, communication, and sociology. Understanding how individuals within organizations perceive and respond to cybersecurity measures involves analyzing their beliefs, attitudes, and behaviors, which are the main concepts in social sciences. (para1,p2)

Research Questions or Hypotheses
The study aims to investigate the impact of organizational cybersecurity determinants on the digital workplace in Iraq. The research questions include assessing perspectives on cybersecurity among management and employees, evaluating the influence of policy and compliance on cybersecurity readiness, and understanding the implications of organizational cybersecurity in the digital workplace. (para2, p3)

Research Methods Used
The article does not specify the research methods used, but it is obvious upon reading the research paper that the used a combination of research methods like qualitative research, observation, interview, data analysis, and case study. This may include surveys and data analysis of cybersecurity policies and compliance measures within organizations. (para2, p5) (p6, para4)

Types of Data and Analysis Done
The types of data collected include survey responses, interview transcripts, organizational cybersecurity policies, and compliance documentation. The analysis involves techniques that are found as patterns in the data, as well as quantitative analysis to measure the impact of cybersecurity determinants on organizational behavior and outcomes. (p7,8,9,10)

Relation to Concepts from PowerPoint Presentations
I believe Concepts from PowerPoint presentations such as organizational culture, and change management are highly relevant to the topic discussed in the article. Understanding how organizational cybersecurity is perceived and integrated into the workplace.

Relation to Challenges, Concerns, and Contributions of Marginalized Groups
The topic of organizational cybersecurity may intersect with challenges faced by marginalized groups within organizations, such as unequal access to resources and opportunities for cybersecurity training and education. Additionally, specific groups may be unfairly impacted by cyber threats and data breaches, further worsening existing problems.

Overall Contributions to Society
The study contributes to society by providing insights into the complexities of organizational cybersecurity and its implications for the digital workplace. I believe by understanding the factors that influence cybersecurity readiness and response within organizations, policymakers, leaders, and cybersecurity professionals can develop more effective strategies to protect sensitive data, ensure business continuity, and control cyber threats in this digital age.

Conclusion
overall, I believe what the article is trying to convey is that although not all organizations have the funds or knowledge to hire or buy tech that can help them secure their systems, there should be a system that can protect these individuals from threat of cyberattacks (in Iraq). Furthermore, the contributions of the study extend beyond the realm of academia, with potential impacts on policymaking, organizational management, and cybersecurity practices. By advancing our understanding of organizational cyberculture and its implications for the digital workplace the study provides a safe and more secure digital environment for all.

Sources used.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/184/66
https://www.emerald.com/insight/content/doi/10.1108/ICS-09-2016-0073/full/html

journal entry 10

social cybersecurity

The text discusses the emergence of social cybersecurity as a critical aspect of national security, particularly in the context of information warfare. It highlights how technology enables state and non-state actors to manipulate beliefs and ideas globally, influencing human behavior, social outcomes, and political dynamics. Information warfare, characterized by (information blitzkrieg) is considered a main type of war, with the potential to weaken trust in institutions and national values across societies. Social cybersecurity, different from traditional cybersecurity, involves humans using technology to “hack” other humans, targeting individuals and societal norms. It is a multidisciplinary field that blends various social sciences and leverages tools to analyze and address cyber changes in human behavior and social dynamics. The text discusses the strategic importance of understanding and countering the evolving landscape of information warfare in the cyber-mediated information environment.

journal entry 11

The cybersecurity analyst job is not just about technical expertise; it’s deeply intertwined with social behaviors. Within the role, trust is paramount, and where you live is key part of the job. as analysts must collaborate effectively with colleagues and stakeholders to address security threats. Collaboration is essential for sharing information and coordinating responses. Moreover, accountability and where you get the job plays a crucial role, as analysts must adhere to ethical standards and take responsibility for their actions to maintain trust and integrity within the organization. the job of a cybersecurity analyst relies heavily on human interactions, emphasizing the importance of teamwork and communication which in turn relates to protecting digital assets and mitigating cyber risks.

journal entry 12

economic theories

  1. This breach notification letter demonstrates the economic concept of cost-benefit analysis. The company must weigh the costs of addressing the data breach, such as hiring a cybersecurity firm and potentially compensating affected customers, against the benefits of protecting customer trust and avoiding reputational damage. By promptly notifying customers and taking steps to safeguard personal information, the company aims to minimize the long-term costs associated with potential identity theft or fraud.
  2. The data breach highlights the concept of (market failure) in cybersecurity. Despite the existence of cybersecurity measures and protocols, such as those implemented by the platform provider, the intrusion still occurred, indicating a failure in the market’s ability to provide adequate protection against cyber threats.

social science theories

  1. This breach notification letter reflects the importance of trust in maintaining relationships between businesses and their customers. The company’s transparency and proactive response to the breach are aimed at preserving customer trust and confidence in its services.

journal entry 13

The bug bounty policy, is a essential aspect of cybersecurity, according the reading outlines procedures for security researchers to report vulnerabilities in an organization’s systems. It includes defining the scope, rules of engagement, resolution protocols, legal protections, and communication channels. A well-defined policy uses researchers to report vulnerabilities responsibly, aids organizations in identifying and addressing security weaknesses, and demonstrates a different approach to cybersecurity. It also contributes to regulatory compliance and risk management efforts.

journal entry 14

according to the reading and from my understanding the 5 main illegal things internet users do are using unofficial streaming services , faking your identity, using other peoples internet network, sharing photos, addresses of others and using copy right. Engaging in these activities not only violates laws and regulations but also poses significant risks to individuals’ cybersecurity, privacy, and ethical integrity. It’s important to use digital services and platforms responsibly, respect others’ rights and privacy, and comply with legal and ethical standards to maintain a safe and secure online environment for everyone. using this sites ore doing this things posses risks such as identity theft and malware.

week 15

digital forensics is the data about the a file that are in the particular hardware. individuals who work in digital forensics with authorities or large companies trying to retrieve any important/lost data. when he was speaking about his career path to becoming a digital forensics personal there were no specific classes he took to become a digital forensics professional;  but he was accountant before he started digital forensics. the way he got in to digital forensics he says ” he had an opportunity to start work at a digital forensics company in Australia and from there he never looked back. Digital forensics investigators relate to the social sciences because Digital forensics rely on insights from social sciences to understand human behavior. by incorporating these insights, digital forensics investigators gain a deeper understanding of digital evidence and its implications within broader societal contexts.