CYSE201S
Cybersecurity and the Social Sciences
Within a social science framework, this course explores the social, political, legal, criminological, and economic aspects of cybersecurity. Students are introduced to a human-factors perspective concerning cybersecurity threats. It shines a light on all those social factors that contribute to cyber attacks as well as legal and political systems developed to manage the actions of those who create risks and incidents. Moreover, this course looks into the different social science fields and their approach in cybersecurity.
Journal Entries
The career of a digital forensics investigator is related to the world of forensic science and social science. As a matter of fact, it focuses on the process of the collection, analysis, and reporting of different electronic data that can be used for law enforcement, thus being presented in courtrooms, for example. The career of a digital forensics investigator is also strictly conveyed through social science. Digital forensics involves the handling of sensitive information. For this reason, it is crucial for them to understand the ethical implications, such as data privacy and ethical treatment. To add to this, investigators need to familiarize themselves with the societal impacts cybercrime has on society as a whole and on individuals. Another reason for its connection with social science is the understanding of criminal behavior, which is a branch of social science. Knowing the factors that push individuals to commit criminal activity is key to their investigations. Moreover, a digital forensics investigator also needs to adhere to some, if not all, social science principles such as skepticism, relativism, ethical neutrality (briefly mentioned above), objectivity, etc. All these social science principles are key social science factors that can significantly impact the outcome and process of an investigation. Investigators need to be objective and ethically neutral in order to conduct a non–biased investigation and must only stick to the data found, leaving aside personal beliefs. Relativism is a principle that proposes the following statement: all things are related. What this means is that in an investigation, the social context and how it impacts behavioral dynamics are very important. Investigators must also be skeptical about their abilities and investigations. This skepticism is another important aspect. This principle enables investigators to question the validity of the information found, providing a more detailed investigation and therefore avoiding hasty conclusions. Davin Teo, a digital forensic investigator, gave a TedTalk talking about how he was introduced to the world of digital forensics. Davin Teo started his career in the accounting field. However, the company Teo worked for was looking for an IT person to help with their networks. That’s when Davin decided to take his chances and delve into the world of IT. With time, Davin became more familiar with and interested in IT (information technology), reviewing many opportunities. One of the biggest opportunities Davin received was one from a company in Australia, the first national digital forensic practice, which was starting a new team. During his TedTalk, Davin points out how the advancements in technology have changed the efficiency of his work as a digital forensics investigator. In the past, a simple job like the one we would define now, like collecting data, for example, would take a very long time. Whereas now, with the new technologies, this process takes less time, increasing the efficiency of investigations. A very interesting aspect of his TedTalk is the incorporation of one of his case studies, which, even if anonymized for obvious reasons, gives a general sense of what a digital forensics investigator does. I think that Davin Teo’s career pathway is truly fascinating. He started his career as a simple, respected accountant only to risk his future and satisfy his desire to grow professionally and understand the realm of IT. This, like he says, turned out to be one of his best decisions, allowing him to make out of digital forensics a successful career in the field of cybersecurity. This, in my opinion, shows the immense opportunities within the cybersecurity realm and the importance of taking risks. His path is truly inspirational. The way he talks about his work shows the passion and dedication he has for his profession and the value of commitment, which enhances professional performance. All extremely valuable things. Throughout the course, we’ve looked at different modules about cybersecurity and its relationship with the social sciences. One module that particularly helped me understand the type of cybersecurity career I want to pursue was the one talking about the different cybersecurity careers. One specific career that I found captivating was that of a digital forensics investigator. Like Davin says, there are many responsibilities and duties a digital forensics investigator must comply with, and their skills are in high demand. In fact, Davin was able to make the most of them and work in the field for almost 20 years. Lastly, the pathway to his career shows how important having certain skills is since it allowed him to completely change his work path. Personally, I think that learning about his experience can be of great help for all those cybersecurity students like myself who want to pursue a career in the field, and that sometimes taking risks can be very rewarding.
In the article “11 Illegal Things You Unknowingly Do Online,” Andriy Slynchuk describes eleven things that internet users do that may be illegal:
1. Using unofficial streaming services
2. Using Torret Services
3. Using copyrighted image
4. Sharing passwords, photos, or addresses of others
5. Bullying and trolling
6. Recording a VoIP call without consent
7. Faking your identity online
8. Using other people’s internet networks
9. Collecting information about children
10. Extracting audio from YouTube
11. Illegal searches on the internet
All these are illegal actions that should be completely avoided, and most importantly, there should be a very clear explanation for their avoidance. Knowing what is allowed and prohibited is crucial to preventing issues of any type. While some of the eleven things may not be as serious as others, none should be taken lightly.
For example, viewing free online content is very risky since most of the time these websites lack protection, making it easy for our identities to be stolen within seconds. In addition, searching for movies online is considered a copyright violation, which one can face legal action for. In fact, using torrent services and accessing copyrighted material for free is against the law. Furthermore, sharing passwords, addresses, or photos without the owner’s permission is illegal; these types of information belong to their owner and can’t be used or shared without their consent. A huge phenomenon is bullying and trolling. Bullying people online and taking advantage of them is very easy. Anyone can hide their true identity behind a fake profile and say or do whatever they want. This, in my opinion, is a very dangerous act that could lead to severe repercussions, like jail time,for example. Faking identity online is another huge issue. One can pretend to have a different name, age, gender, interests, etc. just to get inside the minds of vulnerable individuals and deceive them.
I would say that the following five are the worst violations out of the eleven:
1. Sharing passwords, addresses, or photos of others
2. Bullying and trolling
3. Recording a VoIP call without their consent
4. Faking Identity
5. Collecting information about people younger than 13.
Lastly, I think that the article provides valuable information on how to stay safe online. Limiting the information we share, creating strong passwords, and browsing incognito are all good methods to prevent unwanted situations. The article gives solid, straight-forward information about what is illegal and raises awareness among people while also providing advice.
https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
The article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” discusses BugBounty programs (programs where organizations, software developers, and websites offer compensation for identifying bugs) and their effectiveness in strengthening cybersecurity. It also discusses the significant role Big Bounties have in exposing vulnerabilities missed by internal teams, as well as the role economic incentives have in motivating white-hat hackers to design efficient security measures.
The article focuses on the discussion of the findings, going through all the dynamics of the policies as well as discussing the factors that influence the participation of white-hat hackers. The program age is a crucial aspect impacting future developments and the simplicity of finding weaknesses. It also focuses on the role industries play. Some sectors encounter more vulnerabilities than others, becoming more prone to risks. This is also due to the difficulty in finding the right people who are educated and have adequate skills in the field of cybersecurity. In addition, the credibility of the findings is provided thanks to the use of strategies that enhance big-bounty approaches. These studies propose different methods for the future while looking at long-term sustainability and refining models to predict program configurations.
Overall, thanks to the data provided by HackerOne, the article provides a great insight into BugBounties in order to look at the impact it has on information security. Through the analysis of factors like Bounty amounts, program age, and private and public program dynamics, the article clarifies the difficulties of Bounty systems. Furthermore, it considers solid techniques to establish casual relationships and calculate the effects the program has on vulnerabilities.
NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
The sample data breach notification letter is a letter sent out by a business that has an online website, www.glasswasherparts.com, to inform a customer regarding their identity theft. Some intruders placed malware on the platform’s provider’s servers and managed to gain access to customers’s payment card data. Information like their first and last name, address, phone number, and credit card numbers were involved. In addition, out of all the different economic and social theories, I would say that the ones that best relate to the letter are the laissez-faire theory and the Marxian theory. Laissez-faire economic theory suggests that governments should not intervene in the economy except to protect individuals’s inalienable rights. This is very relatable to the sample data breach notification letter. What makes the theory relatable is the fact that the customer, the victim of the attack, was informed with extreme delay about the occurrence due to the ongoing investigation. This perfectly describes the theory since it allowed for the investigation to proceed without immediate public announcements. The other economic theory that relates to the letter is the Marxian theory. According to Marxian theory, those with power exploit those without power for economic gain. Moreover, the theory also highlights the fact that these individuals are more in danger than the ones who have the power. The individual in this case is completely powerless. There is nothing the individual could have done to prevent this. The customer, in situations like this, is impotent, making him an easier target. Moving onto social science, I would relate the letter to objectivity and ethical neutrality. Objectivity refers to the study of topics in a value-free manner. In this case, the customer is being informed about the breach in a clear and detailed way,without bias or influence. It sticks to proven information and is free from suppositional language. Lastly, it also reinforces ethical neutrality. When conducting research, it is important to adhere to ethical standards. The letter relates to ethical neutrality because its aim is to inform the victim about the incident and advise the victim on how to stay safe. The letter doesn’t blame anyone for the breach; it’s only informative.
‘Social Cybersecurity: An Emerging National Requirement’ is an article written by Kathleen Carley and David Beskow. It examines the new emerging field of social cybersecurity as well as its impacts and how it differentiates itself from ‘traditional’ cybersecurity. Social cybersecurity is defined as a subdomain of national security. A subdomain that will bring major changes in the future, especially in future conflicts. Moreover, this discipline focuses on the scientific study and analysis of cyber changes and the way they affect social, political, cultural, and behavioral human aspects. The article also mentions some prominent personalities, like Dmitry Kiselev, coordinator at the Russian State Agency for International News, who said that in this day and age, the main types of wars are information wars. As a matter of fact, all the power can be applied to the divulgence of information; however, the outcome might be similar to the famous Blitzkrieg of WWII. Like I previously mentioned, social cybersecurity is very different in comparison to the traditional one. In fact, in opposition to this last one, which uses technology to hack other technology, it uses individuals to ‘hack’ other individuals. Information warfare is a great ally since it can be used against opponents to make them weaker and create conflicts between NATO allies, for example. Moreover, despite the fact that geography had a very important role in the past, that doesn’t mean that now it doesn’t (think about the Pacific and Atlantic Ocean for America, for example). However, the importance is now moving towards the human domain. The article also mentions BEND, a framework that describes different methods and research areas to address threats in the social domain. By following this framework, organizations can improve their defensive measures and respond to complications in the social domain.
Module 10 Journal Entry 1 – Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a journal entry describing social themes that arise in the presentation.
Module 9 Journal Entry – Watch the Following Video. Then, complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
Here are my scores:
1) NO
2) NO
3) YES
4) YES
5) NO
6) NO
7) NO
8) YES
9) YES
In all honesty, I was expecting more yes’s, but luckily, with time, I’ve learned to prioritize things like going out with friends, family, or practicing my hobbies. At the end of the day, social media won’t go anywhere and is available at all times, whereas spending time with the people you love and doing what makes you happy isn’t something we’ll always be able to experience. In addition, the items on the scale show different problems caused by social media, which, in my opinion, are very dangerous. The fact that we are letting social media take up so much of our lives isn’t good, and what makes it even more disappointing is the fact that we are the first ones responsible for this. We shouldn’t give social media the importance we are currently giving it because it’s destroying our mental health and the relationships we have with our loved ones. Lastly, to answer the final question, I believe that different patterns are found across the world for several reasons, such as cultural differences (not all countries have the same awareness when it comes to cybersecurity), different laws and regulations that influence cybersecurity, political reasons, and economic conditions.
Module 8 Journal Entry – Watch these videos and pay attention to the way that movies distort hackers. After watching these videos, write a journal entry about how you think the media influences our understanding about cybersecurity. Has this understanding changed over time? What is different in the older pieces of media vs more current media?
Module 6 Journal Entry – We have many misconceptions about cybersecurity. Here, hackers tell you about some of our misconceptions. What personal misconceptions did you have before you started to study cybersecurity? Have those been proven right or wrong?
Module 5 Journal Entry – Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Entertainment
Boredom
Political
Revenge
Recognition
Money
Multiple Reasons
All these motives have been presented to us in several different articles. According to the “Man Behind
LinedIn Scraping” article, 700 million users saw all their data being out in the open. After some
investigations, authorities found the culprit to be a man who stated that he had committed this crime for
pure fun. Despite that, the data he stole from those 700 million users was being sold.
The “New generation of angry and youthful hackers joins the ‘hacktivism’ wave” article addresses the use of cybercrime for political reasons. This article talks about the emergence of new-generation hackers who are joining the hacktivism wave to raise awareness about political issues, encourage change, expose politicians, etc.
The fourth motive, boredom, is also another reason that pushes individuals to commit cybercrime. Young
children interact online without being supervised, increasing their risk of being exposed to cybercriminals. In addition, they find ways to entertain themselves and interact with people online, making them easy targets for cyberbullying, grooming, etc.
Recognition, the fifth motive, is another reason for cybercrime. The “8-month suspended sentence for script kiddie” article talks about the case of Bradley Niblock, a man who launched a distributed denial of service (DDoS) against the website of the Labor Party days before elections.
Like we’ve learned, even an amateur hakcer can earn a very good amount of money by simply doing what they know best. This allows them to have a very good lifestyle and be more drawn to committing crimes, bigger each time, so that they can keep on living a great lifestyle and earn an absurd amount of money.
2. Political
Everyone has different beliefs, and when they don’t match with the rest of the people, the need to “open” people’s eyes and show them a different perspective is very tempting. Not only that, it is also a way to make people more aware of a potential corrupt figure in the political world.
3. Revenge
This is a very common motive since people online, like ex-partners, might want to expose you on the internet to get revenge. In addition, it is also a very serious matter when one’s identity and intimacy get out in the open. This could scar someone for life and produce severe problems.
Some people lack recognition in their real lives from relatives or friends, and being able to show the world their skills and capabilities is a way of making them feel recognized for something they’ve accomplished.
5. Entertainment
Some individuals are just in search of a way to have fun and get involved in illicit online activities that allow them to feel entertained.
6. Boredom
I would rank boredom sixth since it’s a motive that goes hand-in-hand with entertainment. The lack of direction in people’s lives leads them to look for diversion elsewhere. In this case, the internet.
7. Multiple Reasons
Although there are many possible reasons for individuals to engage in illicit online behavior, I would rank this motive last simply because it lacks specificity. On top of that, I think that the motives ranked above are more accurate and based on concrete events.
Module 4 Journal Entry – Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Esteem is the fourth need mentioned in Maslow’s hierarchy. I consider this need to be very connected with the cyberworld. This is because we can post our achievements and announce them publicly. By doing so, we encourage people to interact with our posts, compliment each other, and give words of encouragement. Although I can see why many people post certain accomplishments, this need doesn’t resonate with me because I’m of the idea that keeping things to oneself is better most of the time.
Module 3 Journal Entry – How might researchers use this information to study breaches? What branch or branches of Social Science do you think would beenfit the most from a site hosting this information?
June 2, 2024
First of all, we need to know what a data breach is—more specifically, what is a data breach chronology? When we talk about data breaches in cybersecurity, we mean all those malicious acts one commits when unauthorized people access confidential information. For this reason, in 2005, the Data Breach Chronology was launched with the intention of avoiding data breaches and helping researchers understand such breaches in the US.
I think that the information provided by the article could be very useful. In fact, researchers could use this information to understand the nature of data breaches, the problems they cause, the organizations that are being compromised, the types of breaches, etc. Thanks to all this information, researchers can create new measures that help diminish and prevent such breaches. In addition, I think that branches of social science such as criminology, sociology, and psychology would benefit the most from this site.
This is because, with criminology, for example, we can investigate and learn about the involvement that data breaches have in not adhering to the law, and therefore, criminologists can find adequate reasons to incriminate cybercriminals for their unethical behavior.
Another social science that can benefit a lot from this site is sociology. Sociologists can study human social behavior, patterns of social relationships and interactions, and society as a whole and see how these breaches impact them, as well as the change in trust people put in organizations after incidents like these.
Psychology is another social science that could benefit as well. Psychology allows us to explore and study human behavior, understand why some people feel the need to commit cybercrimes, what brings them to act in certain ways, and also understand how the person or organization that has been a victim of a breach feels afterward.
To conclude, I consider this site to be very helpful, not just for researchers in the field of social sciences but also for people who like to keep themselves informed and safe when using any kind of site, search engine, or app. Sites like PrivacyRights.org are useful since they provide valuable information that allows one to understand the intricacies of cybersecurity.
Module 2 Journal Entry – Define each of the principles of science in your own words. Then, give examples of how each of the principles relates to cybersecurity.
Relativism: Relativism is a philosophical concept promoted by sophists. Relativism claims that values and truths depend on and vary based on the individual, cultural, and historical context. Moreover, with relativism, everything is related. When it comes to cybersecurity and its technological advances, we can see how everything is related, from the educational system to the political system. In addition, with this science, it is important to view behavioral dynamics, social processes, economic decisions, and policy making because, by doing this, we can study and develop adequate cybersecurity strategies that promote an inclusive approach to diversity and security.
Objectivity: When it comes to cybersecurity, being objective is extremely important. What this means is that scientists must have a neutral, impartial, and detached point of view when addressing potential risks and threats. In fact, scientists must be as objective as possible and successfully respond to and analyze potential attacks without being influenced. Everyone has a different opinion regarding different topics, but when it comes to finding security measures, it is pivotal to put our opinions and beliefs aside and find the most suitable cybersecurity measures, overcome any risks, and protect systems.
Parsimony: The term parsimony comes from the Latin parsimonia, which refers to the unwillingness to spend money. In science, however, this term refers to being able to choose the most simple scientific explanation. This way, cybersecurity measures can be easier to understand and, therefore, more practicable. Also, approaching things with parsimony in cybersecurity can help to diminish difficulties and target the problem more efficiently and quickly.
Empiricism: Empiricism is another philosophical term that refers to a belief in which our knowledge is based on our experiences, and more importantly, our sensory experiences. In cybersecurity, we want to depend on empirical affirmations that help us analyze threats and defend ourselves from them. Furthermore, using empiricism is a way of making sure organizations base themselves on real information and avoid deduction. This, in my opinion, is very effective because it avoids drawing inaccurate conclusions.
Ethical Neutrality: Ethical neutrality is a term that, in my opinion, is strictly connected with objectivity. In cybersecurity, when we address a problem, we must be objective and make sure that cybersecurity measures and policies respect ethical principles. Questions like ‘Can professors monitor students’ online coursework to make sure they’re really actually doing their work?’ or ‘Should the police use digital technologies to track human behaviors?’ are important questions one needs to consider. We must respect the confidentiality, integrity, and privacy of individuals and apply effective measures that also respect those principles.
To conclude, like Robert Bierstedt says, I think that these social sciences can be related to the study of cybersecurity. Moreover, I find them very helpful since they can prevent attacks, give simple but effective scientific explanations, give unbiased solutions to find the most efficient cybersecurity measures, etc.
Module 1 Journal Entry – Review the NICE Workforce Framework
May 19, 2024
The National Institute for Cybersecurity Education, also known as the NICE Framework, is a
resource used by employers to help them better understand cybersecurity. In short, this framework determines a “universal” language in order to describe the work of cybersecurity and its workers. By doing this, employers and organizations have a clear understanding of the skills, tasks, and capabilities needed to succeed.
The NICE Framework is made up of seven categories:
Analyze
Collect & Operate
Investigate
Operate & Maintain
Oversee & Govern
Protect & Defend
Securely Provision
Based on my personal ideas and interests, I would rank these seven categories as follows:
1. Protect & Defend
In cybersecurity, the most important thing is to prevent a problem. In fact, with this step, we are able to come up with defensive measures, assess the level of risks, monitor unauthorized activities, and therefore respond to threats. In my opinion, this step is interesting because it allows you to work very closely with the cyberworld. Moreover, I consider it a very fundamental step.
2. Analyze
This, in my eyes, is also a very crucial step because if we want to overcome a situation in an effective way, the first thing we must do is analyze it carefully and weigh out the different possibilities. As a result, we are able to identify the problem and look for the most adequate and effective methods. With this step, the goal is to identify the capabilities and intentions of cybercriminals and look for a solution that is aimed at a specific problem or threat.
3. Investigate
I would put this step in third place since, without cyber investigation, we wouldn’t be able to upgrade to better tactics and techniques and improve an organization’s security measures. In addition, I find the investigation process to be one of the most interesting ones because, due to the advances in technology, the world of cybercrime is becoming more and more powerful. For this reason, the investigation process will always be different, meaning that one will never get tired of applying the same security measures. Instead, they will be different each time.
This category collects information and handles data to then develop operational plans.
5. Operate & Maintain
This category, in my opinion, is strictly connected with ‘Collect & Operate’ and, like the fourth-ranked category, I find it intriguing. In fact, it takes care of everyday security measures by installing, maintaining, and managing software, hardware, and firewalls. Therefore, it ensures that the systems work effectively and safely, and it also ensures the CIA Triad (confidentiality, integrity, and availability).
6. Oversee & Govern
Oversee & Govern, just like the word itself suggests, provides supervision and governance. Also, it provides the staff with advice, develops policies that support cyber enhancement, and provides personnel training.
7. Securely Provision
Lastly, based on my interests, I would put securely provision last. This is because, despite being very important, it’s a basic step. As a matter of fact, in order to develop systems, write codes, and ensure appropriate risk treatment, it is pivotal to protect and defend, analyze, investigate, collect and operate, operate and maintain, and oversee and govern first. Without these initial steps, Securely Provision would be totally useless.
To conclude, I consider protecting and defending, analyzing, investigating, and operating and maintaining to be very interesting steps because they allow you to learn new skills each time, making the whole process intriguing and leaving no room for boredom. Furthermore, they are also essential steps to overcome cyberattacks and prevent threats. That being said, I believe that thelast three steps are also important, but, in my opinion, they’re less complex and ask for fewer skills.