Journal Entries

Journal Entry 1

After visiting the source and going through each area, I was really intrigued by the Protection and Defense (PD), Investigation, and the Implementation and Operation sections. I was actually able to intern in Systems Administration this past summer, so I am very familiar and content with that area of work. I tried to see myself in every line of work, but the one that didn’t really stick with me was the Cyberspace Effects section. I couldn’t connect with most of the roles in that section. I believe that most of the roles connect, which is the beauty of cybersecurity. There are so many different directions you can go.

Journal Entry 2

The principles of science such as observation, hypothesis, experimentation, and analysis, are deeply connected to cybersecurity. In cybersecurity, professionals observe system behaviors and network traffic to detect anomalies. They develop hypotheses about potential vulnerabilities or attack vectors and then experiment by testing these vulnerabilities through penetration testing, ethical hacking, or simulations. The results are carefully analyzed to determine how to mitigate risks or strengthen defenses.

Science also emphasizes decision-making that is backed by evidence, which is crucial in cybersecurity when identifying threats, implementing security protocols, or responding to incidents. Continuous learning and adapting are key components of science and are necessary for cybersecurity to stay ahead of evolving threats. This systematic approach helps security professionals anticipate attacks, build resilient systems, and develop effective strategies for safeguarding digital environments.

Journal Entry 3

Researchers can use the data from PrivacyRights.org to better understand trends and patterns related to data breaches. By studying the information on the types of breaches, industries affected, and attackers’ methods, they can identify common weaknesses and vulnerabilities in cybersecurity practices. This data can also help researchers track how the frequency and severity of breaches change over time, giving insight into the evolving nature of cyber threats.

Additionally, by analyzing these breaches’ financial and legal consequences, researchers can explore the overall impact on businesses and consumers. Ultimately, the publicly available breach data allows for deeper analysis, helping improve security strategies and policies to prevent future incidents.

Journal Entry 4

Maslow’s Hierarchy of Needs shows how human motivation works, starting with just basic needs. Each level connects to different experiences in terms of technology. Having access to the internet, phones, and computers is essential for daily tasks like checking email or doing homework. Technology helps secure very important data like passwords or personal information, whether it is through encryption or antivirus software for safety. At the more personal level, social media and messaging apps help me stay in touch with friends and family. Esteem relates to using technology for positive things like getting good grades, online learning, or completing projects. Self -actualization comes from using technology to learn new skills, and helping me grow throughout my life.

Journal Entry 6

A fake website often mimics a real one, but there are signs to look out for. For example, I compared www.amozon-dealz.com (fake) with the real www.amazon.com. The fake site has misspellings like “amozon” instead of “amazon.” Another fake, www.paypa1-security.com, uses “1” instead of an “l,” while the real site is simply www.paypal.com. I also came across www.googlesupport-login.net, which is fake compared to www.google.com. The fake one adds unnecessary words and uses “.net” instead of “.com.”

I realized fake websites often lack HTTPS security, have poor design, and ask for sensitive information too soon. Spotting these details can help avoid cyber attacks and scams.

Journal Entry 7

When everyone fails a phishing simulation, it highlights the core of human-centered cybersecurity. It shows how people are often the weakest link. It indicates that technical defenses alone aren’t enough—security fatigue, overconfidence, and ineffective training make users more prone to errors. 

The phrase “when login credentials are still on default” highlights a significant security vulnerability that often arises from human behavior and a lack of awareness. Many users tend to overlook changing default login credentials due to convenience or a lack of understanding about the importance of security. 

This phrase highlights how people think just having 2FA means they are fully secure and intelligent in cybersecurity.

Journal Entry 8

The media frequently presents and misrepresents cybersecurity, describing hacking as extremely dramatic or simplistic. Experts pointed out that many movies portray hackers accomplishing difficult tasks in a matter of seconds, such as hacking into systems with eye-catching 3D visuals or typing accurately. As a result, hacking may appear insignificant or unusually fast, giving the impression that it is easy.

Most media still skips the truth in favor of excitement, even when programs like Mr. Robot almost perfectly reflect actual tactics like social engineering or capture-the-flag contests. Viewers may be misled by this exaggeration, which could lead to misunderstandings on cybersecurity. For instance, individuals may believe that hackers can quickly compromise any system, while in practice, hacking frequently requires deep study, long-term dedication, and vulnerability exploits.

Journal Entry 9

After watching the video and completing the test, I scored a five out of nine on it. Reflecting on the items in the scale, I found that many of the questions touched on common experiences related to social media, such as feeling a desire to spend more time online or trying to cut back but struggling to do so. The items seem relevant for measuring how social media may interfere with daily life, especially in areas like time management, emotional well-being, and personal relationships.

Cultural, social, and economic factors may influence different patterns in social media use worldwide. In some cultures, social media may be deeply used in daily routines, creating norms around social connections and self-expression, while other places may emphasize in-person interactions or have less access to social media platforms. Additionally, attitudes toward technology use can vary widely, with some places prioritizing digital things, while others may lack the resources or policies to support balanced social media usage.

Journal Entry 10

The article discusses “social cybersecurity” as an emerging aspect of national security focused on understanding and countering cyber-driven changes in human behavior. Unlike your traditional strategies of cybersecurity that target information systems, social cybersecurity involves using technology to influence human perception and social structures, often termed “cognitive hacking.” The piece highlights Russia’s strategic use of information warfare to weaken the opposition through disinformation and social disruption. They use this to leverage decentralized communication platforms. It showcases the urgency for defense strategies, addressing these cyber-enabled threats. This transformation represents a shift toward targeting human influence over traditional military confrontations and attacks.

Journal Entry 11

The cybersecurity analyst role involves numerous social themes that are crucial for team collaboration and effective communication. Analysts often need to work closely with colleagues to address and resolve security threats, highlighting the importance of trust, coordination, and shared responsibility. The ability to convey complex technical information in an understandable way is key, as analysts regularly interact with non-technical staff. Furthermore, ethical considerations and a strong sense of social responsibility are essential and crucial, as analysts handle sensitive data and ensure organizational integrity while working in a fast-paced, high-stakes, and secure environment. These behaviors create a collaborative and ethical workplace culture.

Journal Entry 12

The data breach notification letter can be explained through some basic economic and social theories. From an economic angle, Risk Management Theory is relevant because the company is trying to reduce damage by informing customers early. This action can help prevent financial loss and maintain the company’s reputation. Additionally, Consumer Trust Theory plays a role here by being open about the breach, the company hopes to keep customers’ trust despite the mistake, which is essential for its long-term business health.

In social sciences, Social Responsibility Theory suggests that companies should act in the public’s best interest, especially when customers’ personal information is at risk. The letter meets this responsibility by notifying customers about the breach and offering steps to protect themselves. Communication Theory also applies because clear, simple communication is crucial during a crisis. By structuring the letter in a way that explains the breach and what customers should do, the company makes it easier for people to understand and respond, which helps rebuild trust.

Journal Entry 13

By rewarding ethical hackers who find flaws in a company’s systems, bug bounty programs encourage businesses to find security flaws. These actions not only save money by preventing expensive data breaches but also promote a competitive environment that attracts skilled hackers from businesses of all kinds. According to the literature, hackers are driven by financial rewards and voluntary reasons like reputation-building or experience-building. The results demonstrate that hackers are not very sensitive to pricing, but elite hackers can be drawn to programs that pay more, which might hurt smaller businesses. Also, the study discovered little “cannibalization” between programs, with newer programs on sites like HackerOne having little to no impact on report rates for older programs. Understanding these relationships helps governments improve bug bounty policies.

Journal Entry 14

First, using unofficial streaming services stood out because it directly undermines the livelihood of content creators and the industry. Bullying and trolling online is another major issue since it can have devastating psychological effects, sometimes even leading to tragic outcomes like suicide. Faking an online identity also feels significant because it often enables scams or other fraudulent activity, breaking trust and causing real harm. Sharing sensitive information like someone’s password, address, or photos without their permission feels like an enormous violation of privacy and can result in harassment or even physical danger. Lastly, recording VoIP calls without consent feels serious because it erodes trust and violates privacy, especially in sensitive personal or professional conversations. 

Journal Entry 15

This pathway shows how diverse experiences can converge into a specialized career. Digital forensics connects strongly to the social sciences because it involves analyzing human behavior, motivations, and actions in the digital realm. Investigators must interpret patterns in data to understand crimes or breaches, often considering psychological and sociological factors behind them. For instance, understanding fraud requires technical expertise and insight into why people commit fraud or how they attempt to conceal it.

The speaker’s background in accounting is particularly relevant here, as financial crimes often require both forensic and analytical expertise. His journey demonstrates the value of interdisciplinary skills and how social science concepts like behavior and decision-making play a critical role in a technical field like digital forensics. This inspires me to think about how my own skills and interests could shape a unique path in cybersecurity.