Journal Entry 1:
Q) Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
A) When it comes to jobs that pertain to cybersecurity I would want to seek a job in cyber defense. Having a job in this field would be allow me be involved with pressing matters. Not just having to look out for the safety of the people but for the whole country’s data. Being able to interact with issues that could involve people from sperate countries would be a unique challenge. Seeking out new ways to prevent possible breaches in the framework or to develop more efficient ways to solve issues that arise.
Journal Entry 2:
Q) Explain how the principles of science relate to cybersecurity
A) Studying the principles of science can help in many ways when in comes to cybersecurity. Through the education and implementations of social science principals it can further ones ability’s to have positive impacts in preventing incidents. Understanding the principles of – relativism, objectivity, parsimony, skepticism, ethical neutrality, and determinism creates a well rounded and ethical cybersecurity individual. Someone that has knowledge of these principles can use them to analyze cyberattacks from a deeper standpoint. Creating a ethical and moral compass when it comes to interacting with cyber incidents. These principles allow for questioning to be done in a controlled manner. Looking at cyber attacks from many different perspectives to create a cohesive understanding of the possible ways the attacks occurred beyond the natural sciences.
Journal Entry 3:
Q) Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
A) This site offers many insights on the various laws and privacy laws. The information can be viewed by state to ensure accuracy and to know the differences between each state’s policies. This site also provides vast amount of statistics and data on previous data breaches that have occurred in the past years. The documentation of previous studies and cyber incidents can help researchers create action plans for the future. Understanding how previous breaches happened can allow for researchers to know how to handle situations or how to not handle situations. Learning from the prior studies and research done can teach researchers the proper way to preform a study on a data breach. The site also offers many tips and attempts to educate people on how to reduce the likelihood of breaches. Overall, this site offers a researcher a more productive way in educating themselves on breaches.
Journal Entry 4:
Q) Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
A) Maslow’s Hierarchy of Needs is a ranking system that ranks the different types of needs a person attempts to reach in life. Placing technology into a similar framework can show how technology impacts someone’s life at each tier. Each tier will be listed below with an experience I have had with technology.
Physiological Needs– I have lost track of my phone multiple times which resulted in me psychologically being frustrated, worried, and uneasy.
Safety Needs- When I was younger one of my account’s passwords had been compromised or was attempted to be accessed by someone other than myself. This was a time when I was worried about my safety as well as the safety of my positions.
Belongingness & love needs- Technology allows me to have more efficient contact with loved ones and friends. Creating a way for myself to be more connected to people in my life.
Esteem needs- With the development of social media, it started to impact how I saw myself. This impacted my self-esteem in positive and negative ways. Worrying about how many likes I got on a photo or the lack of followers I had.
Self-actualization- Technology allowed me to pursue many activities that I found enjoyment in. Videogames allowed me to create more friends and engage in an activity I enjoyed. Technology also allowed me to learn more skills at a faster rate. Ultimately allowing me to do the activities or tasks I wanted to be able to do.
Journal Entry 5:
Q) Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. Individual Motive depends on individuals and crimes. A link to an example of each motive is included:
A) • Entertainment rank 6 https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/
-Entertainment is at rank because to me it seems more likely that someone would want to gain something out of a cyberattack. The main thing someone would do for fun would just be to gain more experience
• Political rank 5 https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms
-I place political motive at rank 5 because out of all the motives it is a very niche reason in my opinion. While a political motive can be outside of government politics I feel that most people that are acting out of political motive are not the average person. I would say that someone that is acting on a political motive is done by the more experienced hackers.
• Revenge rank 4 https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/
– Revenge is at rank 4 because everyone has been done wrong in some kinda way. This can be a small wrongdoing or a large one. Revenge is an emotional response or action. That being said people act on emotions more than rational reasoning.
• Boredom rank 7 https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/
– Boredom is at rank 7 because out of the other motives on this list it makes the least sense. While I could see someone being bored and committing a crime I feel that it is the least likely reason out of the ones on this list.
• Recognition rank 2 https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/
– Recognition is at rank 2 because everyone wants to be recolonization for something they are good at. Therefore, many hackers join groups so that they can leave a mark/ get credit for doing something. Overall, many hackers would rather be anonymous when it comes to personal information but they wouldn’t mind having an alias.
• For Money rank 3 https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/
– Money is at rank 3 because everyone wants to have more money. It motivates people to do many bad things or to go as far as they can to obtain more money.
• Multiple reasons rank 1 https://www.infosecurity-magazine.com/news/what-drives-hackers-to-a-life-of/?cf_chl_jschl_tk=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-gqNtZGzNAfijcnBszQi6
– Multiple reasons rank 1: because it is more likely that someone acts on multiple motives rather than one individual one. An individual would be motivated by money but then see that they want recognition deep down. On top of that, they may find it entertaining to get revenge on someone.
Journal Entry 6:
Q) Can you spot three fake websites and compare them to three real websites, plus showcase what makes the three websites fake?
A) One thing that I noticed when looking into fake websites is that all the fake websites attempt to catch the eye of the person that is opening the web page. Another thing that I noticed that is common for fake websites is that it is not optimized/don’t use the whole screen or webpage. The fake websites can look like a newsletter at times. The things that these fake websites have on them are a lot of ads that deter the user’s ability to use the webpage efficiently.
The websites I viewed all spread misinformation but attempt to make it seem real. This is either to get you to sign up for something or attempts to have you share the page.
Fake website 1: http://www.thedogisland.com/
Fake website 2: https://zapatopi.net/treeoctopus/
Fake website 3: http://www.dhmo.org/
Journal Entry 7:
Q) Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s).
https://unsplash.com/photos/ICTKcvnXx_8

This relates to human system integration framework because it is important to educate people about the risk they put themselves at when doing certain actions. When it comes to using public Wi-Fi it can be one of the most unsafe networks to use. Allowing others on the public Wi-Fi to access your computer or device that is connect to the network. This goes to show how important it is to incorporate human system integration to prevent potential workers from falling victims to malicious cyber attackers.
Journal Entry 8:
Q) Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube https://www.youtube.com/watch?app=desktop&v=6BqpU4V0Ypk
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
A) Movies typically distort hackers and their capabilities. Movies go on to embellish multiple aspects of hackers such as the speed that something can be hacked into. Typically movies make it seem like you can hack something or read code within minutes. When it would take an extensive amount of time to comb through the code or hack into something. Another thing movies do is create items that don’t exist in real life which gives off the appearance that hackers have such capabilities. Overall, the abilities of a hacker are embellished in movies. Films make it seem like it is easy for skilled hackers to access whatever they want. This gives off the impression that no one is really safe or secure online.
Journal Entry 9:
Q) Social Media and Cybersecurity Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
A) I said yes to 4/9 of the question on the social media disorder scale. I think that some of the questions in the scale are broad which can lead to a bit of confusion if it applies to you. I think the areas the scale attempts to explore are effective areas in determining if someone has a disorder. The reason there are different patterns around the world is due to access to the internet. Furthering that depending on social norms can dictate who has phones or what amount of access is granted. In the United States, younger kids have phones or access to social media whereas in many other countries kids don’t have such a privilege.
Journal entry 10:
Q) Journal 10: Social cybersecurity. Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/
A) Social cybersecurity in the past decade has become even more prevalent and needed. Wars have turned from traditional kinetic wars into cyber wars with the development of technology. Technology allowed for the spread of information as well as the ability to get information from a wider spread of sources. This is why social cyber security is an important thing for a country to adhere to. Opposing countries can spread disinformation to break the morals of the other country’s society. Ultimately, the wars will not be won by kinetic force or by taking over the land. The wars will be won by socially deconstructing the opposing city from the inside out. Mainly by turning the citizens of a country against the government or leadership. This is why social cyber security is important. It is there to prevent oppositions from making contact at a societal level.
Journal Entry 11:
Q) Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
A) An economic theory that relates to this letter is the Laissez-fare economics theory. This theory poses that governments shouldn’t intervene in the economy unless it is to protect individuals. In this case, the government is being involved in order to protect the users that may have had their information taken. A second economics theory that relates to this letter is the Cost/benefit analysis. This is done in order to determine what the cost/ benefit is in telling the users there was a compromise. Additionally, this analysis is done in order to determine what choices make the most sense for a company or individual. The Rational choice theory is a social science theory that is used to determine what to do about the situation. To determine what choices to make that would provide the overall best outcome. Additionally, the person receiving this information uses this theory to make the best choice on how to respond or act knowing their information is at risk. Deterrence theory also relates to this letter. The entity that conducted the crime feels that it is worth doing the crime. Determining that the possible punishments for getting caught aren’t bad enough. Resulting in the person not being deterred. Ultimately, the government should have harsher laws or sentencing for someone that gets caught committing crimes. This would result in less criminal activity because people wouldn’t want to be subjected to such sentencing.
Journal Entry 11-2:
Q) A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
A) It is no shock that bug bounties are an effective policy that can be used to create a more secure network. Across the board, on average a company will be hacked at some point or have some form of a cyber breach. Typically cyber security is a discipline that is in response to an incident. One way the cybersecurity field has managed to be one step ahead in his setting up bug bounties. Bug bounties benefit both the company and the hackers. Bug bounty policy allows hackers to make money or get recognized while also making a company aware of what weakness it has in its cybersecurity.
Journal Entry 12:
Q) Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
A) Andriy Slynchuk goes over 11 different things that internet users do that are illegal in nature. The five most serious violations in my opinion are numbers 11,9,8,7, and 5 from the image. Illegal searches on the internet are serious because the things that are considered illegal to search on the internet are illegal for a reason. If someone is attempting to look such things up it could be cause for concern. Collecting information about children is another serious violation. Collect information on children below the age of 13 violets the Children protection act. Additionally, this is bad because it could expose the kids to content that a kid should not receive. Using other people’s intent networks is another serious issue because if someone is using your private network and looking or searching up illegal things on the internet it comes back to your internet network. This is a concern for the person that’s internet network is being used. Faking your identity online is another issue because it could be classified as identity fraud if it is someone else’s information. It can also be an issue when it comes to the content that is being shown to the user if it thinks the age of the user is older. Bullying and trolling online is a major issues because they can lead to real-life effects. The bullying someone receives online can lead to self-harm or negative effects on their mental state.
Journal Entry 13:
Q) Complete Patchin and Hinduja’s cyber bullying survey. After completing the survey, discuss how you think criminologists might use the surveys to explore relationships between the different items.
A) Criminologists could use the information collected in order to determine what type of cyberbullying occurs more often. It can also determine who is more likely to cyberbully someone or who is more likely to receive cyberbullying. This is useful information because it can lead to better anti-bullying education. It can also lead to less bullying if people know what to look out for.
Journal Entry 14:
Q) Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube https://www.youtube.com/watch?v=Pf-JnQfAEew Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
A) It what shocking to hear that at the time the speaker started his position or career in digital forensic there were no classes or courses on it. He was originally an accountant who thought IT sounded fun to do since he liked to mess with computers. Which resulted in him being introduced to IT-related jobs. Ultimately, he found a job in digital forensics through his accounting company. It is interesting to hear the story of someone who got introduced into the IT field before the field was as in demand as it is now. At this time information technology careers are highly needed as well as sought out. Additionally, nowadays it is even more common for colleges or online courses to exist that teach IT-related skills.