Journal Entries

Journal Entry #1

After reviewing the NICE framework’s work role categories, I find myself most interested in the investigative side of cybersecurity. This path blends critical thinking, technical expertise, and real-world impact. Roles such as cybercrime investigator or digital forensics analyst appeal to me because they involve analyzing incidents, uncovering evidence, and preventing future attacks. I enjoy the challenge of piecing together digital findings to understand how breaches occur.

On the other hand, areas like implementation and operation are less appealing. Although they are essential for maintaining secure systems, the routine nature of system administration does not provide the same complexity or excitement. I am drawn to dynamic environments where I can solve problems and contribute to justice through technology.

Journal Entry #2

Empiricism makes cybersecurity stronger by focusing on real evidence instead of guesswork. Collecting data like network traffic, user activity, and attack patterns helps security teams spot new threats as they appear. It also shows whether current defenses are actually working or if adjustments are needed. By studying this data over time, organizations can stay ahead of attackers and develop smarter strategies that evolve with changing risks. Empirical analysis also improves planning by making incident response and threat prediction more accurate. In short, relying on observed evidence keeps cybersecurity practical, adaptable, and better prepared for real-world challenges

Journal Entry #3

Researchers gain a better understanding of patterns and trends in the data breaches by using the Privacy Rights Clearinghouse’s publicly available data. The database contains comprehensive details pertaining to thousands of breaches that have been disclosed since 2005, including the kind of breach, the businesses impacted, the data exposed, and the method in which it was discovered. Researchers can determine which industries are most at risk, what kinds of attacks are growing more frequent, and how the scope of breaches  has evolved over time by examining this data. This information can be used to predict future patterns in breaches and to help companies and legislators create more robust safeguards and efficient preventative measures. Furthermore, comparing data from different states might indicate areas where privacy las could be strengthened and show variations in reporting procedures.

Journal Entry #4

My digital encounters have a strong connection to Maslow’s Hierarchy of Needs. For starters, having access to gadgets and the internet is necessary for my daily life and academic work, especially as a cyber security student. I use cybersecurity solutions like VPNs and multi-factor authentication to safeguard my data. Online communities provide a sense of belonging; I feel linked through my tech communities, group chats, and class forums. Building my e-portfolio and obtaining certifications like CompTIA Security+, which increase confidence and recognition, are examples of how I demonstrate my sense of self-worth. Finally, utilizing technology to work toward my long-term objective of becoming a cybersecurity project manager supports self-actualization. I can study, lead, and develop using digital tools in ways that support my personal and professional goals.

Journal Entry #5

Among the eight motives for cybercrime, financial gain ranks highest because it’s the most practical and widely understood. Hackers often target systems to steal money, cryptocurrency, or data they can sell, as seen in the BitMart hack and HP’s infographic on cybercriminal spending. Political motives come next, with hacktivist groups launching attacks to protest governments or influence public opinion. Recognition ranks third because some hackers seek fame or validation, even from institutions like NASA. Curiosity, especially among youth, is a strong fourth, as shown by the 15-year-old who hacked NASA just to explore. Revenge is fifth, driven by personal emotions like anger or betrayal. Sixth is the “multiple reasons” category, which reflects the complex mix of ego, money, and ideology behind many attacks. Entertainment ranks seventh, as thrill-seeking lacks deeper purpose. Boredom ranks last because it’s the least compelling motive, often linked to impulsive or harmful behavior without clear intent.

Journal Entry #6

Fake websites are a growing threat in the digital world, often designed to mimic legitimate platforms while tricking users into sharing personal or financial information. According to Kaspersky, scam websites typically use emotional manipulation, urgent messaging, and deceptive design to lure victims. For example, “US-GovLottery.com” falsely claims to be a government-run lottery, while demanding upfront fees, unlike the real Powerball.com, which never asks winners to pay to claim prizes. Similarly, “PayPal-Verify.net” mimics PayPal’s branding but uses a suspicious domain and pressures users to update payment info, a classic phishing tactic. In contrast, PayPal.com uses secure login protocols and never sends unsolicited requests for sensitive data. Another fake site, “FreeCryptoBonus.io,” promises free cryptocurrency with no verifiable company background, unlike Coinbase.com, which provides transparent compliance and security measures. Norton highlights spoofing techniques like domain manipulation (e.g., “amaz0n” instead of “amazon”) to trick users into clicking malicious links. The FTC warns that scammers often exploit trending topics or emergencies to create urgency and bypass skepticism. Recognizing these red flags, such as poor grammar, suspicious URLs, and unrealistic offers, is essential for staying safe online.