{"id":133,"date":"2024-01-16T17:30:14","date_gmt":"2024-01-16T17:30:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-08-04T16:40:58","modified_gmt":"2024-08-04T16:40:58","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cbelf001\/it-cyse-200t-2\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity and the Social Sciences<\/h1>\n<p>Within a social science framework, this course explores the social, political, legal, criminological, and economic aspects of cybersecurity. Students are introduced to a human-factors perspective concerning cybersecurity threats. It shines a light on all those social factors that contribute to cyber attacks as well as legal and political systems developed to manage the actions of those who create risks and incidents. Moreover, this course looks into the different social science fields and their approach in cybersecurity.<\/p>\n<p>&nbsp;<\/p>\n<h1>Journal Entries<\/h1>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 14<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Journal Entry<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Watch the vid<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">eo about a Digital For<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ensic Investigator giving a TedTalk <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">think<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">about<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">how<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">career<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">digital<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">forensics<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">investigators<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">relate<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">social <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sciences.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Write a journal entry describing what you think about the speaker\u2019s pa<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">thway to his <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">career<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The career of a digital forensics investigator is related to the world of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">forensic science<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and social <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">science<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. As a matter of fact, it focuses on the process of the collection, analysis, and reporting of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different electronic data that can be used for law enforcement, thus be<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ing presented in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">courtrooms, for example<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">career of a digital forensics investigator<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">i<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s also strictly conveyed <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">through social science. Digital forensics involves the handling of sensitive information. For t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">his <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">reason, it is crucial for them to understand the ethical implications, such as data privacy and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ethical treatment<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To add to this, investigators need to familiarize themselves with the societal <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">impacts cybercrime has on society as a whole and on indivi<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">duals. Another reason for its <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">connection with social science is the understanding of criminal behavior, which is a branch of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">social science<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Knowing the factors that push individuals to commit criminal activity is key to their <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">investigations. Moreover, a d<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">igital forensics investigator also needs to adhere to some, if not all, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">social science principles such as skepticism, relativism, ethical neutrality (briefly mentioned <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">above), objectivity, etc<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">All these social science principles are key social science fac<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tors that can <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">significantly impact the outcome and process of an investigation. Investigators need to be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">objective and ethically neutral in order to conduct a non<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">biased investigation and must only stick <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to the data found, leaving aside personal beliefs<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">R<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">elativism is a principle that proposes the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">following statement: all things are related. What this means is that in an investigation, the social <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">context and how it impacts behavioral dynamics are very important. Investigators must also be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">skeptical about th<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">eir abilities and investigations<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This skepticism is another important aspect. This <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">principle enables<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">v<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">estigators<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to question the validity of the information found, providing a more <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">detailed investigation and therefore avoiding hasty conclusions. Davin Teo, a digit<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">al forensic <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">investigator, gave a TedTalk talking about how he was introduced to the world of digital forensics<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Davin Teo started his career in the accounting field. However, the company Teo worked for was <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">looking for an IT person to help with their networ<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ks. That\u2019s when Davin decided to take his <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">chances and delve into the world of IT<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">With time, Davin became more familiar with and interested <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in IT (information technology), reviewing many opportunities. One of the biggest opportunities <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Davin received was on<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">e from a company in Australia, the first national digital forensic practice, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">which was starting a new team<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">During his TedTalk, Davin points out how the advancements in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technology have changed the efficiency of his work as a digital forensics investigator.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In the past, a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">simple job like the one we would define now, like collecting data, for example, would take a very <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">long time<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Whereas now, with the new technologies, this process takes less time, increasing the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">efficiency of investigations. A very interesti<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ng aspect of his TedTalk is the incorporation of one of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">his case studies, which, even if anonymized for obvious reasons, gives a general sense of what a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">digital forensics investigator does<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I think that Davin Teo\u2019s career pathway is truly fascinating. He <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tarted his career as a simple, respected accountant only to risk his future and satisfy his desire to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">grow professionally and understand the realm of IT. This, like he says, turned out to be one of his <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">best decisions, allowing him to make out of digital fo<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">rensics a successful career in the field of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This, in my opinion, shows the immense opportunities within the cybersecurity <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">realm and the importance of taking risks. His path is truly inspirational. The way he talks about his <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">work shows the pa<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ssion and dedication he has for his profession and the value of commitment, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">which enhances professional performance<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">All extremely valuable things. Throughout the course, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">we\u2019ve looked at different modules about cybersecurity and its relationship with the s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ocial <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sciences. One module that particularly helped me understand the type of cybersecurity career I <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">want to pursue was the one talking about the different cybersecurity careers<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">One specific career <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that I found captivating was that of a digital forensics<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">investigator. Like Davin says, there are many <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">responsibilities and duties a digital forensics investigator must comply with, and their skills are in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">high demand. In fact, Davin was able to make the most of them and work in the field for almost 20 <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">years<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">La<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">stly, the pathway to his career shows how important having certain skills is since it <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">allowed him to completely change his work path. Personally, I think that learning about his <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">experience can be of great help for all those cybersecurity students like myse<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">lf who want to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">pursue a career in the field, and that sometimes taking risks can be very rewarding<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 12 Journal Entry &#8211; Andriy Slynchuk has described eleven things <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Internet users do that may be illegal. Review what the author says and write <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">a journal entry describing the five most serious violations and why you think <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">those offenses are serious.<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In the article \u201c11 Illegal Things You Unknowingly Do Online,&#8221; Andriy Slynchuk d<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">escribes eleven <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">things that internet users do that may be illegal:<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Using unofficial streaming services<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Using Torret Services<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Using copyrighted image<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sharing passwords, photos, or addresses of others<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Bullying and trolling<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Recording a VoIP call without consent<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Faking your identity online<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">8.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Using other people\u2019s internet networks<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">9.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Collecting information about children<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">10.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Extracting audio from YouTube<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">11.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Illegal searches on the internet<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">All these are illegal actions that should be completely avoided, and most importantly, there should <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">be a very clear explanation for their avoidance. Knowing what is allowed and prohibited is crucial <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to preventing issues of any type. While some of the eleven things may not be as serious as others, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">none should be taken lightly.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">For example, viewing free online content is very risky since most of the time these websites lack <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">protection, making it easy for our identities to be stolen within seconds. In addition, searching for <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">movies online is considered a copyright violation, which one can face legal action for. In fact, using <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">torrent services and accessing copyrighted material for free is against the law. Furthermore, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sharing passwords, addresses, or photos without the owner\u2019s permission is illegal; these types of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">information belon<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">g to their owner and can\u2019t be used or shared without their consent. A huge <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">phenomenon is bullying and trolling. Bullying people online and taking advantage of them is very <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">easy. Anyone can hide their true identity behind a fake profile and say or do whatever they want. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This, in my opinion, is a very dangerous act that could lead to severe repercussions, like jail time,<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for example. Faking identity online is another huge issue. One can pretend to have a different <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">name, age, gender, interests, etc. just to get inside the minds of vulnerable individuals and deceive <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">them.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I would say that the following five are the worst violations out of the eleven:<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sharing passwords, addresses, or photos of others<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Bullying and trolling<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Recording a VoIP call without their consent<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Faking Identity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Collecting information about people younger than 13.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PageAnnotations\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The five most serious violations I chose, in my opinion, could all fall under the category of cyber <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">victimization. I believe that targeting innocent people online by sharing their private information <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and photos, bullying them, recording them without their consent, faking identities to deceive <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">individuals, and collecting information about children should all be considered very seriously. I <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">can\u2019t even count the number of stories I\u2019ve hear<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">d about young children or women who take their <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">lives because of other people\u2019s actions\u2014<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">deciding to post intimate photos, for example, or bullying <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">individuals because of their appearance. The most horrendous thing about all this, however, is <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">collecting information about children. They are unaware of the things that can happen to them <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and aren\u2019t mature enough to understand the dangers and protect themselves. Moreover, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">recording people without their consent is truly crazy. How would these criminals feel if every <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">aspect of their personal lives was shared with millions and millions of people? To answer that <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">question, they wouldn\u2019t like it at all. Recording people without consent is a horrible thing. The <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">victims of such illegalities might see photos of themselves online in compromising situations, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">negatively impacting the way family, friends, and colleagues view their lives.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, I think that the article provides valuable information on how to stay safe online. Limiting <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the information we share, creating strong passwords, and browsing incognito are all good <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">methods to prevent unwanted situations. The article gives solid, straight-forward information <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">about what is illegal and raises awareness among people while also providing advice.<\/span><\/div>\n<div><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 11 Journal Entry 2 &#8211; Read this article<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=tru<\/span><\/strong><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">e. and write a summary reaction to the use of the policies in your journal. Focus <\/span><\/strong><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">primarily on the literature review and the discussion of the findings.<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article \u201cHacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Bounties\u201d discusses BugBounty programs (programs where organizat<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ions, software developers, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and websites offer compensation for identifying bugs) and their effectiveness in strengthening <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity. It also discusses the significant role Big Bounties have in exposing vulnerabilities <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">missed by internal teams, as well as the role economic incentives have in motivating white-hat <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hackers to design efficient security measures.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article focuses on the discussion of the findings, going through all the dynamics of the policies <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">as well as discussing the factors that influence the participation of white-hat hackers. The program <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">age is a crucial aspect impacting future developments and the simplicity of finding weaknesses. It <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">also focuses on the role industries play. Some sectors encounter more vulnerabilities than others, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">becoming more prone to risks. This is also due to the difficulty in finding the right people who are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">educated and have adequate skills in the field of cybersecurity. In addition, the credibility of the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">findings is provided thanks to the use of strategies that enhance big-bounty approaches. These <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">studies propose different methods for the future while looking at long-term sustainability and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">refining models to predict program configurations.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">From<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">a<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">literary point<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">view, the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">article<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">focuses on<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">literary aspects by highlighting the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">misguidence of preceding research and by providing a greater understanding of bugs. Moreover, it <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">discusses the importance of using traditional security measures and highlights the role of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">economic<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">incentives<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">show<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">how<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">bug<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">bounty<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">draws<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">attention<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">clings<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">onto<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">qualified <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">researchers.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Overall, thanks to the data provided by HackerOne, the article provides a great insight into <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">BugBounties in order to look at the impact it has on information security. Through the analysis of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">factors like Bounty amounts, program age, and private and public program dynamics, the article <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">clarifies the difficulties of Bounty systems. Furthermore, it considers solid techniques to establish <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">casual relationships and calculate the effects the program has on vulnerabilities.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, I found this article very informative. HackerOne data provides a valuable explanation of the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">dynamics of bug bounty. With the evolution of the cyber world, our security and combat methods <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">must evolve with them. The economic model developed underscores the successes of bug bounty <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for improving cybersecurity and points out the importance of investments in the field.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 11 Journal Entry 1<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Read the sample breach letter<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cSAMPLE DATA BREACH<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">NOTIFICATION\u201d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and describe how two different economics theories and two different social <\/span><\/strong><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sciences theories relate to the letter.<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The sample data breach notification letter is a letter sent out by a business that has an online <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">website, www.glasswasherparts.com, to inform a customer regarding their identity theft. Some <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">intruders placed malware on the platform\u2019s provider\u2019s servers and managed to gain access to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">customers\u2019s payment card data. Information like their first and last name, address, phone nu<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">mber, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and credit card numbers were involved. In addition, out of all the different economic and social <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">theories, I would say that the ones that best relate to the letter are the laissez-faire theory and the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Marxian theory. Laissez-faire economic theory suggests that governments should not intervene in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the economy except to protect individuals\u2019s inalienable rights. This is very relatable to the sample <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">data breach notification letter. What makes the theory relatable is the fact that the customer, the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">victim of the attack, was informed with extreme delay about the occurrence due to the ongoing <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">investigation. This perfectly describes the theory since it allowed for the investigation to proceed <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">without immediate public announcements. The other economic theory that relates to the letter is <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the Marxian theory. According to Marxian theory, those with power exploit those without power <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for economic gain. Moreover, the theory also highlights the fact that these individuals are more in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">danger than the ones who have the power. The individual in this case is completely powerless. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">There is nothing the individual could have done to prevent this. The customer, in situations like <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">this, is impotent, making him an easier target. Moving onto social science, I would relate the letter <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to objectivity and ethical neutrality. Objectivity refers to the study of topics in a value-free <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">manner. In this case, the customer is being informed about the breach in a clear and detailed way,<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">without bias or influence. It sticks to proven information and is free from suppositional language. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, it also reinforces ethical neutrality. When conducting research, it is important to adhere to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ethical standards. The letter relates to ethical neutrality because its aim is to inform the victim <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">about the i<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ncident and advise the victim on how to stay safe. The letter doesn\u2019t blame anyone for <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the breach; it\u2019s only informative.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 10 Journal Entry 2 &#8211; Read the following and write a journal entry summarizing your response to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the article on social cybersecurity.<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2018Social Cybersecurity: An Emerging National Requirement\u2019 is an article written by Kathleen Carley and David <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Beskow. It examines the new emerging field of social cybersecurity as well as its impacts and how it <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">differentiates itself from \u2018traditional\u2019 cybersecurity. Social cybersecurity is defined as a subdomain of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">national security. A subdomain that will bring major changes in the future, especially in future conflicts. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Moreover, this discipline focuses on the scientific study and analysis of cyber changes and the way they <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">affect social, political, cultural, and behavioral human aspects. The article also mentions some prominent <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">personalities, like Dmitry Kiselev, coordinator at the Russian State Agency for International News, who said <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that in this day and age, the main types of wars are information wars. As a matter of fact, all the power can <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">be applied to the divulgence of information; however, the outcome might be similar to the famous <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Blitzkrieg of WWII. Like I previously mentioned, social cybersecurity is very different in comparison to the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">traditional one. In fact, in opposition to this last one, which uses technology to hack other technology, it <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">uses individuals to \u2018hack\u2019 oth<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">er individuals. Information warfare is a great ally since it can be used against <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">opponents to make them weaker and create conflicts between NATO allies, for example. Moreover, despite <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the fact that geography had a very important role in the past, that does<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">n&#8217;t mean that now it doesn\u2019t (think <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">about the Pacific and Atlantic Ocean for America, for example). However, the importance is now moving <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">towards the human domain. The article also mentions BEND, a framework that describes different methods <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and research areas to address threats in the social domain. By following this framework, organizations can <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">improve their defensive measures and respond to complications in the social domain. <\/span><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To conclude, as I <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">reflect on this article, I understand even more the impact social cybersecurity has on our society. Seeing the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">power it has acquired and the one it continues to acquire is mind-blowing, especially since it is also an <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">important part of the political world. So much so that it is being described like<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the Blitzkrieg. It\u2019s<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">so potent <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that it\u2019s even becoming a bigger threat to all those relationships established between countries.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 10 Journal Entry 1 &#8211; Watch this video. As you watch the video, think about how the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">description of the cybersecurity analyst job relates to social behaviors. Write a journal entry <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">describing social themes that arise in the presentation.<\/span><\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In the video \u2018What Does a Cybersecurity Analyst Do? Salaries, Skills, and Job Outlook\u2019, Nicole Enesse <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">explains the duties and responsibilities of cybersecurity analysts as well as the places one can work in, how <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">much one can earn, the path to take to become one, and future predictions. Essentially, the duties a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity analyst has are the responsibility to monitor, respond, and defend a network from any kind of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyber attack. In addition, their role is to also provide individuals with advice and training to enhance user <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">awareness. Despite that, the role of a cybersecurity analyst can vary from company to company. The great <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">thing about working as an analyst is the fact that there are plenty of opportunities. Every organization, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">whether it\u2019s strictly connected with the field of cybersecurity or not, needs someone as skilled as a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity specialist being an essential part of the company. As concerns salaries, like Nicole suggests, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">places such as Dallas, Washington, DC, Boston, Atlanta, and New York pay the highest. In Washington, D.C., <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for example, it is possible to earn around $117.000. That being said, for all those in the cybersecurity field <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">who are considering pursuing a career as a cybersecurity analysts, the cost of living is something to take <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">into consideration. Furthermore, when it comes to certifications, CYSA+, for example, is a good recognition <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of the skills one has as well as a degree in IT or computer science. Internships, immersing oneself in the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more technical aspects of cybersecurity, and making as many experiences as possible are great ways to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">grow personally and career-wise. Moreover, having a solid and well-organized resume is the key to making <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">an outstanding impression on employers. The field of cybersecurity, more specifically, cyber analysts in this <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">case, has great predictions for the future, with a growth rate of 31%. Finally, yet importantly, I found the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">video very interesting because not only does it provide all the information one needs to embark on the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyber journey, but there are also social themes that arise in the presentation. Diversity and inclusivity is a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">very important social theme, in my opinion, because it encourages individuals to believe in their abilities <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and pursue careers in the field without fear of being rejected. Another theme is the social and economic <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">aspects. The job of a cybersecurity analyst has a good salary, but individuals must take into consideration <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">things like the cost of living. Earning a lot of money and spending it all on rent,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for example, wouldn\u2019t be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ideal. Overall, I really enjoyed watching this video because it gave me some more information on the topic, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and I appreciated the fact that Nicole Enesse gave us advice on things to consider beside degrees and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">certifications.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 9 Journal Entry &#8211; Watch the Following Video. Then, complete the Social Media Disorder <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scale. How did you score? What do you think about the items in the scale? Why do you think <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that different patterns are found across the world?<\/span><\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I would describe Dave as obsessed with social media. In fact, I don\u2019t like when pe<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ople around me post every <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">single bit about their day because I think, What\u2019s the point? Is it really worth it? Why would someone risk <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">being targeted or having someone close to them targeted due to the lack of privacy? The more we share <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">online about our lives, the higher the chance of being a victim of a cyberattack. When we do that, we are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">making it 10 times easier for a hacker to do whatever they wish with our data, and that is far from being <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">okay. Like the video shows us, Dave is the kind of person who, with his carelessness and lack of thinking, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">puts at risk not only himself but an entire organization. Looking at the \u2018Social Media Disorder Scale&#8217;, I\u2019ve <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">realized even more the power social media has on us. Although I use social media, I wouldn\u2019t describe <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">my<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">self as someone who\u2019s addicted to it.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Here are my scores:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">NO<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">NO<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">YES<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">YES<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">NO<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">NO<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">NO<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">8)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">YES<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">9)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">YES<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In all honesty, I was expecting more yes&#8217;s, but luckily, with time, I\u2019ve learned to prioritize things like going <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">out with friends, family, or practicing my hobbies. At the end of the day, social medi<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">a won\u2019t go anywhere <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and is available at all times, whereas spending time with the people you love and doing what makes you <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">happy isn\u2019t something we\u2019ll always be able to experience. In addition, the items on the scale show different <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">problems caused by social media, which, in my opinion, are very dangerous. The fact that we are letting <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">social media take up so much of our lives isn\u2019t good, and what makes it even more disappointing is the fact <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that we are the first ones responsible for this. We shouldn\u2019t give so<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cial media the importance we are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">currently giving it because it\u2019s destroying our mental health and the relationships we have with our loved <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ones. Lastly, to answer the final question, I believe that different patterns are found across the world for <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">several reasons, such as cultural differences (not all countries have the same awareness when it comes to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity), different laws and regulations that influence cybersecurity, political reasons, and economic <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">conditions.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 8 Journal Entry &#8211; Watch these videos and pay attention to the way that movies distort <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hackers. After watching these videos, write a journal entry about how you think the media <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">influences our understanding about cybersecurity. Has this understanding changed over time? <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What is different in the older pieces of media vs more current media?<\/span><\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In the first video, we can see how an internationally recognized security analyst, author, researcher, and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">speaker named Keren Elazari goes through some movie hacking scenes and gives her experienced opinion <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">on them. In most of the hacking scenes, we can see how, due to the lack of experience in the cybersecurity <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">field, they show an altered and unreal reality of how hackers work. Most of the time, they show bad OPSEC <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(operational security), invented words to make something sound \u201ccooler\u201d mixe<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">d with realistic cybersecurity <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">terms, mapping tools, and protocols such as SSH NUKE, credential stuffing, Wi-Fi pineapple, etc. In the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">second video, Samy Kamkar, a computer hacker and co-founder of Open Path Security, talks about other <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hacking scenes. In the movie X-Files, for example, they print out an encrypted code. In the real <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity world, this is pointless because most of the characters present in a file wouldn&#8217;t be visible. In <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">another movie scene, they try to destroy a hard drive by using magnets and a microwave, which could be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cgood\u201d ways to destroy a hard drive. Other scenes show a denial<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">-of-service attack. Usually, this type of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">attack doesn\u2019t use manipulative methods like altering a web browser; instead, it brings down a system that <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">isn\u2019t sh<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">own in the movie clip. In another clip, we can see the use of a device called MagSpoof, which is a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">very efficient and real cybersecurity method (an electromagnet that creates a magnetic field). The third and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">final video shows movie clips that use 3D images<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">when, in reality, that doesn\u2019t occur. As a matter of fact, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">we can see a lot of codes and text, but never 3D images. A movie called \u2018The Italian Job&#8217;, for example, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">shows the process of traffic light hacking. This is a very possible thing since most traffic light systems are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">internet-controlled. Furthermore, in another clip, we can see a program called XKEYSCORE. This allows the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">surveillance, search, and analysis of global data. All these movie clips have proven the power media has in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">influencing people, mak<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ing them believe things that don\u2019t necessarily correspond to reality. Like we\u2019ve <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">seen, many movies, both older and newer ones, show false methods and hacking mechanisms to make a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">certain scene look more intriguing and thought-provoking, only for the sake of the movie. However, these <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">fake scenes can be easily spotted by a more experienced eye. Despite the fact that to this day many movies <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">show a distorted hacking reality, I think that there is a lot more awareness and understanding of what <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">should be considered real and fake, especially because with the non-stop advances in technology, people <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">are learning new ways to keep themselves safe and, therefore, are more informed on the topic. In short, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">nowadays, there is more awareness in the cybersecurity field. As a matter of fact, the main difference I&#8217;ve <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">encountered between the older pieces of media and the newer ones is the increasing threats in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity that are pushing individuals to learn more about online security. Also, newer media shows <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tools<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">help<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">combat<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">threats<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">advises<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">people<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">use<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">several<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">methods<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">prevent <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyberattacks. To conclude, I think that overall, the media is much more informed and acts as a tool to raise <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyberawareness amongst people.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 6 Journal Entry &#8211; We have many misconceptions about cybersecurity. Here, hackers tell <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">you about some of our misconceptions. What personal misconceptions did you have before you <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">started to study cybersecurity? Have those been proven right or wrong?<\/span><\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Before I started studying cybersecurity, I had many misconceptions regarding this field. In fact, I <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">wasn\u2019t as familiar as I am now with all the different types of risks involving cybercrime, and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">therefore, I never thought of the idea of a random individual being a target. As a result, I always <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">thought that an individual with a low profile wouldn\u2019t be at risk, that being safe online is not our <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">responsibility, and that using public Wi-Fi anywhere is risk-free. In reality, diving into the world of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity, I\u2019ve learned that all those misconceptions I once had don\u2019t correspond to the reality <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of cybersecurity. According to an article titled \u2018Research Shows 25% of Travelers Hacked Via Public <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Wi-<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Fi While Abroad\u2019, it is in fact possible<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to be a victim of cybercrime even for doing things that <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">may seem \u201csmall\u201d and &#8220;innocuous,\u201d like using a public Wi<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">-Fi, for example. This article talks about <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">research conducted by NordVPN, a cybersecurity company, which revealed that one in four <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">travelers has been hacked while using public Wi-Fi. This event shouldn&#8217;t be underestimated. Using <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">public Wi-Fi in public places like airports, for example, is a very common mistake because of the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">lack of information amongst people on things like cybercrime. Hackers can set up Wi-Fi spots <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">wherever they wish, and as soon as someone connects to them, hackers can access all types of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">personal data about you. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In my opinion, this is a huge problem because not only can they handle <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">our own sensitive information, but they can also threaten us with it, leading to even worse <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scenarios. In addition, I realized that most of the time, our activity online is a factor that could <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">contribute to and push hackers to target a certain individual instead of another. This is explained <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in an article titled<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2018Don\u2019t click that link! How criminals access your digital devices and what <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">happens when they<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">do\u2019. Even though a lot of times we don\u2019t do anything to deserve an attack, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">some people misbehave online, meaning that they don\u2019t pay attention to click<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">-bait titles, sketchy <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">links, or accepting famous cookie pop-ups. Believe it or not, a hacker can swipe all of your <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">information in a matter of seconds. For this reason, it is crucial that we examine our actions very <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">carefully. One wrong click can lead to serious consequences! Thankfully, studying cybersecurity <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and getting to know all the possible ways of attacking and defending oneself has helped me <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">incredibly, and all the misconceptions I had proved me wrong. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To conclude, I believe that we <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">should all be more cautious with our actions, learn how to avoid unwanted situations, use <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">firewalls, and be responsible about what kind of information we decide to make public.<\/span><\/div>\n<div><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<p><strong>Module 5 Journal Entry &#8211; Review the articles linked with each individual motive.\u00a0 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0 Explain why you rank each motive the way you rank it.<\/strong><\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Unfortunately, the motives that push individuals to make unethical choices on the internet are several. As a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">matter of fact, many people commit cybercrime for reasons like:<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Entertainment<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Boredom<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Political<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Revenge<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Recognition<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Money<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf02d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Multiple Reasons<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">All these motives have been presented to us in several different articles. According to the \u201cMan Behind<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">LinedIn Scraping\u201d article, 700 million users saw all their data being out in the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">open. After some<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">investigations, authorities found the culprit to be a man who stated that he had committed this crime for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">pure fun. Despite that, the data he stole from those 700 million users was being sold.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The \u201cNew generation of angry and youthful hackers joins the \u2018hacktivism\u2019 wave\u201d article addresses the use <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of cybercrime for political reasons. This article talks about the emergence of new-generation hackers who <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">are joining the hacktivism wave to raise awareness about political issues, encourage change, expose <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">politicians, etc.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Another article, \u201cRevenge Porn Victims in Wales,\u201d addresses the third motive, revenge. Revenge porn has <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">always been a big case, a crime often committed by ex-partners or complete strangers with the intent of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">extortion or as a form of trolling. In Northern Wales, there have been 21 cases of image-based sexual <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">abuse. Moreover, the scary thing about this is that with the help of AI, criminals can fake pornography, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">making these cases even bigger.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The fourth motive, boredom, is also another reason that pushes individuals to commit cybercrime. Young<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">children interact online without being supervised, increasing their risk of being exposed to cybercriminals. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In addition, they find ways to entertain themselves and interact with people online, making them easy <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">targets for cyberbullying, grooming, etc.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Recogn<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ition, the fifth motive, is another reason for cybercrime. The \u201c8<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">-month suspended sentence for <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">script kiddie\u201d article talks about the case of Bradley Niblock, a man who launched a distributed denial of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">service (DDoS) against the website of the Labor Party days before elections.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cSex, drugs, and toilet rolls\u201d is the title of an article that talks about money and how cybercriminals feel the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">need to commit crimes and earn as much as possible. As a result, entry-level hackers can make up to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">$42,000, mid-level hackers up to $900.000, and high-earning hackers up to $2 million a year.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PageAnnotations\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">As well as recognition, money, boredom, entertainment, politics, and revenge, there are also other reasons <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that incite cybercriminals to commit crimes. Just like the \u201cWhat drives hackers to a life of cybercrime?\u201d <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">article suggests, psychological factors and technical skills drive hackers to act unthically and unlawfully. <\/span><\/div>\n<div><\/div>\n<div class=\"PageAnnotations\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Personally, after having read all the different articles talking about the several motives that incite hackers <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to commit cybercrime, I<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ve made my own list, ranking each motive from 1 to 7 as the motives that I think <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">make the most sense.<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Money<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Like we\u2019ve learned, even an amateur hakcer can earn a very good amount of money by simply doing what <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">they know best. This allows them to have a very good lifestyle and be more drawn to committing crimes, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">bigger each time, so that they can keep on living a great lifestyle and earn an absurd amount of money.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Political<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Everyone has different beliefs, and whe<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">n they don\u2019t match with the rest of the people, the need to \u201copen\u201d <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">people\u2019s eyes and show them a different perspective is very tempting. Not only that, it is also a way to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">make people more aware of a potential corrupt figure in the political world.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Revenge<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This is a very common motive since people online, like ex-partners, might want to expose you on the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">internet to get revenge. In addition, it is also a very serious matter when one\u2019s identity and intimacy get out <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in the open. This could scar someone for life and produce severe problems.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Recognition<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Some people lack recognition in their real lives from relatives or friends, and being able to show the world <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">t<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">heir skills and capabilities is a way of making them feel recognized for something they\u2019ve accomplished.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Entertainment<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Some individuals are just in search of a way to have fun and get involved in illicit online activities that allow <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">them to feel entertained.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Boredom<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I would rank boredom sixth since it\u2019s a motive that goes hand<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">-in-hand with entertainment. The lack of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">direction in people\u2019s lives leads them to look for diversion elsewhere. In this case, the internet.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Multiple Reasons<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Although there are many possible reasons for individuals to engage in illicit online behavior, I would rank <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">this motive last simply because it lacks specificity. On top of that, I think that the motives ranked above are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more accurate and based on concrete events.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To conclude, I consider these motives to be very severe because many people could get badly hurt due to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">their poor actions or other people\u2019s ones. We must find a way to avoid all these problems and, therefore, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">protect ourselves against any dangerous situations.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Module 4 Journal Entry &#8211; Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology.\u00a0 Give specific examples of how your digital experiences relate to each level of need.<\/strong><\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Maslow\u2019s Hierarchy of Needs is a theory that puts human needs<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">into five categories, from basic needs to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">psychological needs and self-fulfillment needs such as food, water, warmth, rest, safety, intimate <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">relationships, feeling accomplishments, and achieving one\u2019s full potential. According to Maslow\u2019s Hierarchy, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">our behavior is determined by our needs, and our needs can change over time.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I think that nowadays, this psychological theory is applicable in the cyber world since technology has <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">majorly evolved and nearly everything that surrounds us is strictly connected to technology. In the case of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technology, I think that the basic needs like food, water, warmth, and rest can be associated with a good <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">internet connection and all-time access to any online source since these are the main steps to navigate <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">online. I consider this need to be very important because if we want to feel like part of something without <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">being afraid of \u201cstaying behind,\u201d we need to have a good internet connection and all<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">-time access. <\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Safety is another basic need. As I previously mentioned, whether we like it or not, the internet is taking <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">over a big part of our lives, and the only thing we can do is adapt. Moreover, as people working or studying <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in the cybersecurity world, we must find improved safety measures. When I w<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">as younger and wasn\u2019t as <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">familiar as I am now with technology, I made a few mistakes that led to my computer being infected, and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that is due to the lack of safety. In fact, to avoid these kinds of security problems, we must be more <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cautious and find more suitable solutions.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Maslow\u2019s Hierarchy also mentions the need for belongingness and love. Just like it happens in the real <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">world, humans feel the need to love, feel loved, and belong to someone, which are things that can be easily <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">achieved with technology. As a result, many people install apps in the hopes of finding a friend or a partner, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and social media is a way of connecting with people and growing relationships that satisfy their needs. The <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">internet has helped me reconnect with some childhood friends, giving me the possibility to reinstall a good <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">relationship with them.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Esteem is the fourth need mentioned in Maslow\u2019s hierarchy. I consider this need to be very connected with <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the cyberworld. This is because we can post our achievements and announce them publicly. By doing so, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">we encourage people to interact with our posts, compliment each other, and give words of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">encouragement. Although I can see why many people post certain accomplishments, this need doesn\u2019t <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">re<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sonate with me because I\u2019m of the idea that keeping things to oneself is better most of the time.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PageAnnotations\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The last need in the hierarchy is self-actualization, which stands at the top of the pyramid. Being able to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">grow personally or career-wise is one of the most fulfilling things. Realizing our potential, pushing ourselves <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to experience new things, and growing is extremely important. This can help us perceive ourselves in better <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ways and believe in our potential. Social media plays a huge role in this. We can find videos about history <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that improve our general knowledge, videos of people exercising that push us to live a healthier life, quotes <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that motivate us, tutorials that teach us different skills, etc. Thanks to technology and social media, I was <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">able to learn a third language because of some videos that taught grammatical rules, which aroused my <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">curiosity. This has helped me not only to grow personally, but it has also given me the possibility to have <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more open doors in the world of work.<\/span><\/div>\n<div><\/div>\n<div class=\"PageAnnotations\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, I think that<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Marlow\u2019s Hierarchy of Needs plays a significant role even in the cyber world because it <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">provides different ways of fulfillment.<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Module 3 Journal Entry &#8211; How might researchers use this information to study breaches? What branch or branches of Social Science do you think would beenfit the most from a site hosting this information? <\/strong><\/p>\n<p><strong>June 2, 2024<\/strong><\/p>\n<p>First of all, we need to know what a data breach is\u2014more specifically, what is a data breach chronology? When we talk about data breaches in cybersecurity, we mean all those malicious acts one commits when unauthorized people access confidential information. For this reason, in 2005, the Data Breach Chronology was launched with the intention of avoiding data breaches and helping researchers understand such breaches in the US.<\/p>\n<p>I think that the information provided by the article could be very useful. In fact, researchers could use this information to understand the nature of data breaches, the problems they cause, the organizations that are being compromised, the types of breaches, etc. Thanks to all this information, researchers can create new measures that help diminish and prevent such breaches. In addition, I think that branches of social science such as criminology, sociology, and psychology would benefit the most from this site.<\/p>\n<p>This is because, with criminology, for example, we can investigate and learn about the involvement that data breaches have in not adhering to the law, and therefore, criminologists can find adequate reasons to incriminate cybercriminals for their unethical behavior.<\/p>\n<p>Another social science that can benefit a lot from this site is sociology. Sociologists can study human social behavior, patterns of social relationships and interactions, and society as a whole and see how these breaches impact them, as well as the change in trust people put in organizations after incidents like these.<\/p>\n<p>Psychology is another social science that could benefit as well. Psychology allows us to explore and study human behavior, understand why some people feel the need to commit cybercrimes, what brings them to act in certain ways, and also understand how the person or organization that has been a victim of a breach feels afterward.<\/p>\n<p>To conclude, I consider this site to be very helpful, not just for researchers in the field of social sciences but also for people who like to keep themselves informed and safe when using any kind of site, search engine, or app. Sites like PrivacyRights.org are useful since they provide valuable information that allows one to understand the intricacies of cybersecurity.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 2 Journal Entry &#8211; Define each<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of the principles of science<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">your own word<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s. Then<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, give examples of <\/span><\/strong><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">how<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">each of the principles<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">relates to cybersecurity.<\/span><\/strong><\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sunday 26, 2024<\/span><\/strong><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">According to Robert Bierstedt, the social sciences follow the same principles as the natural <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sciences. As a matter of fact, the social sciences are considered to be as scientific as the natural <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ones, and they can be related to the study of cybersecurity. The social sciences are six: relativism, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">objectivity, parsimony, empiricism, ethical neutrality, and determinism. Each of these sciences <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">allows for the understanding of cybersecurity.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Relativism: Relativism is a philosophical concept promoted by sophists. Relativism claims that <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">values and truths depend on and vary based on the individual, cultural, and historical context. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Moreover, with relativism, everything is related. When it comes to cybersecurity and its <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technological advances, we can see how everything is related, from the educational system to the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">political system. In addition, with this science, it is important to view behavioral dynamics, social <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">processes, economic decisions, and policy making because, by doing this, we can study and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">develop adequate cybersecurity strategies that promote an inclusive approach to diversity and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Objectivity: When it comes to cybersecurity, being objective is extremely important. What this <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">means is that scientists must have a neutral, impartial, and detached point of view when <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">addressing potential risks and threats. In fact, scientists must be as objective as possible and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">successfully respond to and analyze potential attacks without being influenced. Everyone has a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different opinion regarding different topics, but when it comes to finding security measures, it is <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">pivotal to put our opinions and beliefs aside and find the most suitable cybersecurity measures, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">overcome any risks, and protect systems.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Parsimony: The term parsimony comes from the Latin parsimonia, which refers to the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">unwillingness to spend money. In science, however, this term refers to being able to choose the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most simple scientific explanation. This way, cybersecurity measures can be easier to understand <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and, therefore, more practicable. Also, approaching things with parsimony in cybersecurity can <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">help to diminish difficulties and target the problem more efficiently and quickly.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Empiricism: Empiricism is another philosophical term that refers to a belief in which our <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">knowledge is based on our experiences, and more importantly, our sensory experiences. In <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity, we want to depend on empirical affirmations that help us analyze threats and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">defend ourselves from them. Furthermore, using empiricism is a way of making sure organizations <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">base themselves on real information and avoid deduction. This, in my opinion, is very effective <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">because it avoids drawing inaccurate conclusions.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Ethical Neutrality: Ethical neutrality is a term that, in my opinion, is strictly connected with <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">objectivity. In cybersecurity, when we address a problem, we must be objective and make sure <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that cybersecurity measures and policies respect ethical principles. Questions like \u2018Can professors <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">monitor students\u2019 online coursework to make sure they\u2019re really actually doing their work?\u2019 or <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2018Should the police use digital technologies to track human behaviors?\u2019 are important questions <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">one needs to consider. We must respect the confidentiality, integrity, and privacy of individuals <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and apply effective measures that also respect those principles.<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Determinism: Determinism refers to those behaviors caused or influenced by preceding events. As <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">a matter of fact, determinism is important in cybersecurity since it can greatly help to understand <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">threats, manage them, and prevent them.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">conclude, like Robert Bierstedt<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">says<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, I thin<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">k<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that th<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ese s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ocial sciences can be related to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">study of cybersecurity<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. Moreo<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ver<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I find them<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">very helpful since they can<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">prevent attac<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ks, give <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">simple but effective scientific explanations,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">give<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">unbiased sol<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">utions to find the<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most ef<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">fic<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ient <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity measures<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">etc<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 1 Journal Entry<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Review the NICE Workforce Framework<\/span><\/strong><\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<p><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">May 19, 2024<\/span><\/strong><\/p>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The National Institute for Cybersecurity Education, also known as the NICE Framework, is a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">resource used by employers to help them better understand cybersecurity. In short, this <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">framework determines a<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201c<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">universal<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">language in order to describe the work of cybersecurity and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">its workers. By doing this, employers and organizations have a clear understanding of the skills, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tasks, and capabilities needed to succeed.<\/span><\/p>\n<p><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The NICE Framework is made up of seven categories:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Analyze<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Collect &amp; Operate<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Investigate<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Operate &amp; Maintain<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Oversee &amp; Govern<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Protect &amp; Defend<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Securely Provision<\/span><\/p>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Based on my personal ideas and interests, I would rank these seven categories as follows:<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Protect &amp; Defend<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In cybersecurity, the most important thing is to prevent a problem. In fact, with this step, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">we are able to come up with defensive measures, assess the level of risks, monitor <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">unauthorized activities, and therefore respond to threats. In my opinion, this step is <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">interesting because it allows you to work very closely with the cyberworld. Moreover, I <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">consider it a very fundamental step.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Analyze<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This, in my eyes, is also a very crucial step because if we want to overcome a situation in <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">an effective way, the first thing we must do is analyze it carefully and weigh out the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different possibilities. As a result, we are able to identify the problem and look for the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most adequate and effective methods. With this step, the goal is to identify the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">capabilities and intentions of cybercriminals and look for a solution that is aimed at a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">specific problem or threat.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Investigate<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I would put this step in third place since, without cyber investigation, we wouldn\u2019t be able <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to upgrade to better tactics and techniques and improve an organizat<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ion\u2019s security <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">measures. In addition, I find the investigation process to be one of the most interesting <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ones because, due to the advances in technology, the world of cybercrime is becoming <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more and more powerful. For this reason, the investigation process will always be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different, meaning that one will never get tired of applying the same security measures. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Instead, they will be different each time.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Collect &amp; Operate<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This category collects information and handles data to then develop operational plans.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Operate &amp; Maintain<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">T<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">his category, in my opinion, is strictly connected with \u2018Collect &amp; Operate\u2019 and, like the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">fourth-ranked category, I find it intriguing. In fact, it takes care of everyday security <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">measures by installing, maintaining, and managing software, hardware, and firewalls. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Therefore, it ensures that the systems work effectively and safely, and it also ensures the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CIA Triad (confidentiality, integrity, and availability).<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Oversee &amp; Govern<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Oversee &amp; Govern, just like the word itself suggests, provides supervision and governance. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Also, it provides the staff with advice, develops policies that support cyber enhancement, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and provides personnel training.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Securely Provision<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, based on my interests, I would put securely provision last. This is because, despite <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">being very important, it\u2019s a basic step. As a matter of fact, in order to develop systems, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">write codes, and ensure appropriate risk treatment, it is pivotal to protect and defend, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">analyze, investigate, collect and operate, operate and maintain, and oversee and govern <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">first. Without these initial steps, Securely Provision would be totally useless.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To conclude, I consider protecting and defending, analyzing, investigating, and operating and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">maintaining to be very interesting steps because they allow you to learn new skills each time, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">making the whole process intriguing and leaving no room for boredom. Furthermore, they are also <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">essential steps to overcome cyberattacks and prevent threats. That being said, I believe that the<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">last three steps are also important, but, in my opinion, they<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2019re le<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ss complex and ask for fewer <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">skills.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences Within a social science framework, this course explores the social, political, legal, criminological, and economic aspects of cybersecurity. Students are introduced to a human-factors perspective concerning cybersecurity threats. It shines a light on all those&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cbelf001\/it-cyse-200t-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28443,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/users\/28443"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/133\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}