Journal Entry 1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
Since I have always been driven and fascinated by technology and like working with computers, I will concentrate on cyber defense in my career. I will use my critical thinking and problem-solving abilities to restore the systems and mitigate damage by being on the front line. Working in threat intelligence is exciting as it involves collecting and analyzing data and preventing cyber-attacks.
The cybersecurity architecture, which is essential for developing secure systems, is the least appealing aspect because it emphasizes long-term planning. Establishing security protocols, which often involve extensive documentation and regulatory compliance, is important and is less engaging than action in defending against active threats.
Journal Entry 2: Explain how the principles of science relate to cybersecurity.
The principles of science include Determinism, Objectivity, relativism, and Parsimony. First, Determinism states that every event is determined by the previous one. The predictable qualities of attacks allow cybersecurity professionals to examine patterns from past incidents to improve future defenses. Second, Objectivity refers to the ability to observe and report information, I think Security measures should rely on clear data and facts, not personal views. Third, Parsimony states that the simplest solution is always the best. Computer tools should be made simple and easy to use. Lastly, relativism refers to the fact that knowledge and truth can change based on the context. Cybersecurity can be seen in how different countries approach data privacy regulation.
Journal Entry 3: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
The website offers a comprehensive resource for tracking data breaches in the United States. The website provides locations, several companies, public record charts, and maps to examine data breaches and the specifics of various kinds of breaches. The site has records from over two decades, so researchers can utilize this information to detect breaches and prevent them from occurring. They can use it to determine if specific industries are more vulnerable than others. Researchers can continue understanding risk and developing better strategies to improve data security and privacy protections.
Journal Entry 4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s hierarchy of needs is a psychological theory; I will describe how each level relates to my experiences with technology.
Physiological needs: some people grab their phones to catch up with posts on social media or contact family and friends when they wake up in the morning. Other physiological needs for humans are water, food, and shelter. They are not really focused on technology, especially seniors. I can relate to this since I grab my phone when I wake up to check the weather and see who has texted me. Security and safety needs: This level is about building safety and security online. For example, I set two-factor authentication for my online banking account to protect it from unauthorized access. Love and Belongingness Needs: Social media platforms like Instagram and WhatsApp help me stay in contact with my loved ones abroad; I can call them on video call as long as they have an internet connection. Esteem Needs: This level is about self-esteem; I remember that, in my remote job, I met with my coworkers on Zoom to discuss work projects and receive feedback from our manager. Self-Actualization Needs: this level focuses on achieving goals. I have a fitness app called Onlifefitness, which provides tools to track workouts, set goals, and monitor progress. The apps offer personalized workout plans, dietary recommendations, and even virtual coaching if I can’t make it to the gym to push physical limits to achieve fitness goals.
Journal Entry 5: Review the articles linked with each individual motive in the presentation page or Slide #3. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- For money: This makes the most sense because financial gain drives many crimes like hacking, robbing banks, and fraud. Some people would do anything for money.
- Political: Cybercrime may be motivated by politics. People may target the government to promote and raise interest in social concerns.
- Recognition: People commit crimes for recognition as they want to showcase their skills so everyone will know when it happens.
- Revenge: People who fired from their jobs hack their companies in a type of revenge.
- Multiple reasons: There are many reasons people commit crimes; it could be for money, jealousy, fear, anger over something, or wanting to get revenge against people.
- Entertainment: Out of 6, hackers have fun breaking organizations’ systems, which can be entertainment.
- Boredom: This is last because hackers could write strips while bored and test them on organizations just for fun. This can also be entertaining.
Journal Entry 6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
Fake websites
- www.get-free-giftCard.com
- www.Amaz0n-shop.net/
- http://www.ups-delivery.org/
When I encounter a fake website, the first thing I notice is the domain name; they either misspell it or replace some letters. Secondly, the images are clouded, and the site is usually confused with ads promising free stuff if you provide your phone number or email. Additionally, these websites never give an address or a real phone number.
Real websites
- www.Amazon.com
- www.ebay.com
- www.whitehouse.gov
A real website always has easy navigation; the domain name matches the organization name and the correct spelling. They provide real phone numbers and addresses. Always look for HTTPS in the URL and security badges like SSl to ensure safe browsing. Additionally, checking consumer reviews can further validate the website’s credibility.
Journal Entry 7: Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s).
- https://unsplash.com/photos/Links to an external site.mfB1B1s4sMcLinks to an external site.
- https://unsplash.com/photos/gySMaocSdqsLinks to an external site.
- https://unsplash.com/photos/ICTKcvnXx_8Links to an external site.
- https://unsplash.com/photos/Z3ownETsdNQLinks to an external site.
- https://unsplash.com/photos/5QgIuuBxKwMLinks to an external site.
- https://unsplash.com/photos/R6dSBkz32B8Links to an external site.
- https://unsplash.com/photos/BXiLSwwvqrYLinks to an external site.
- https://commons.wikimedia.org/wiki/File:Computer_user_icon.svgLinks to an external site.
- https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpgLinks to an external site.
- https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).Links to an external site.jpgLinks to an external site.
- Explain how your memes relate to Human Systems Integration.

She just received an exciting news via email. The meme captures the positive emotional reaction people can have when technology facilitates good news. When people receive good news on their phones, it reinforces their trust and willingness to engage with that system in the future. The results of interactions with the technology can have a big impact on the joy experience.
Journal Entry 8
Watch this video and pay attention to the way that movies distort hackers.Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
Many movies show that hacking is simple and easy; a lot of movie scenes feature unrealistic technology or methods, such as the ability to hack into a secure network system within seconds or bypass security measures without effort. In the real world, however, hacking into a system or reading code requires a significant amount of time, skill, and effort. Real-life hackers must have an in-depth understanding of computer systems, networks, and security protocols, and they often spend days, weeks, or even months to achieve their goals. Another thing that is mentioned in the video is that some of the hacks or things they created aren’t even real in the real world of cybersecurity. Overall, movies make hacking seem easy as if anyone can effortlessly break into any system and steal or take whatever information they desire.
Journal Entry 9: Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
After completing the social media disorder scale, I scored 4 out of 9. Social media has undeniably become an integral part of life for people worldwide. The questions on the scale felt relevant and thought-provoking. Honestly, I find it difficult to go anywhere or stay home without engaging with social media. It seems to get more addictive with each passing day. In today’s world, traditional methods of communication, like exchanging phone numbers, are often replaced by simply sharing social media. Additionally, social media has become a powerful platform for many individuals to build and grow their businesses.
Journal Entry 10: Read this and write a journal entry summarizing your response to the article on social cybersecurity.
The article Social Cybersecurity explains that information has become a weapon. It highlights that Countries can create significant problems without using physical force, just spreading misinformation that can break down trust in society. It emphasizes the change from traditional warfare to targeting humans, using technology to control social networks and information. The article highlights the need for military leaders to collaborate with agencies to combat information warfare. It suggests that the Department of Defense should pass policies that enable ethical and practical tricks. Additionally, it highlights the importance of educating the military and society about the decentralized nature of modern information environments and their risks.
Journal Entry 11: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
The cybersecurity analyst job requires several themes that are important to the role. One of the themes is to be able to collaborate with your teams to identify vulnerabilities. Use psychology to predict and stop cybercriminals who mislead others into sharing their personal information. The influence of people’s behaviors on cybersecurity is another sociological factor, as individuals’ online activities affect the number of cyberattacks. The job involves teaching people about threats and creating a culture of awareness. These social aspects demonstrate how cybersecurity is very important in society and the people who commit themselves to protecting sensitive information and ensuring a safer online environment.
Journal Entry 12: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
After reading the notification letter, rational choice theory can relate to this letter. The company’s decision to tell consumers and provide advice on how to protect themselves and minimize their possible reputations. Another theory that can relate is Marxian economics it demonstrates how consumers’ data is treated as an asset in the digital economy that was exploited by vulnerabilities in the company’s infrastructure. For social science determinism theory, where hackers are determined to steal customers’ personal information. Relativism theory the company’s response to the breach in the legal and ethical context. Address the customer to contact the credit company and inform them that their card information has been compromised.
Journal Entry 13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
Bug bounty policies are a cost-effective way for organizations to improve their cybersecurity by leveraging the expertise of ethical hackers who identify vulnerabilities in exchange for reward. The study discovered no effect on the number of new businesses joining the platform and that companies in the financial, such as retail and healthcare industries, get less legitimate vulnerabilities. Also, it shows that hackers are typically price insensitive, meaning smaller companies can benefit from these programs, regardless of their financial brand. However, the research also implies that returns will decrease with time when visible defects are corrected, while extending testing might reduce this impact. Bug bounty policies are an important cybersecurity strategy that improves organizational security while promoting more comprehensive innovation and collaboration.
Journal Entry 14: Described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

My top five most serious violations. Bullying and trolling, when targeting children online are incredibly harmful as young individuals often lack the means to protect themselves, harassment can lead to severe emotional distress or even suicide. Sharing passwords, addresses, or photos of others without permission, posting someone’s private property without permission can expose sensitive information and put their lives in danger. Faking your identity online is a serious offense that often leads to fraud. Illegal searches on the internet, looking up incriminating or harmful content, can lead to legal action and raise ethical concerns. Lastly, using someone else’s internet network without permission is a form of theft that happens almost every day, as people often exploit unsecured Wi-Fi networks for unauthorized access.
Journal Entry 15:
Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site.Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
I learned a lot about digital forensics from David Teo. His career journey was inspiring, as he started as an accountant, then transitioned into IT and became a digital forensics investigator. I can relate to this; I started college with computer science and then switched to a cybersecurity major. The video highlights how digital forensic investigators analyze electronic proof to investigate cybercrime and combine technical expertise with understanding human behavior. This interdisciplinary method shows the importance of understanding the technology also the motivations and actions of people that involved in crimes.