Journal Entries

Entry #1 Ann’s Story

Ann’s story shows the need for cybersecurity. Her story shows the need for cybersecurity, because it shows that most people are not conscious about security, especially when free stuff is involved, and there needs to be some kind of protection. the video also shows how human behavior interacts with technology. It shows the optimism that most people have for others to not harm them, but in reality with technology between people they are more likely to harm others due to the protection of being behind a screen.

Entry #2 NIST

The NIST category that interests me the most is the “operate and maintain” category. This interests me the most because it seems like it will be the most hands on of them and that it what I would like to do.

The NIST category that I would like to stay away from is the “Oversee and Govern” category. I would rather do things myself rather than just tell someone else to do it. I would also prefer to stay out of main leadership rolls, but I will step up if it is necessary.

Entry #3 How researchers use information shared by the former criminal (This video)

Information given by former criminals could give a new perspective on whatever the study is about. The information shared could be used to confirm suspicions about why people do what they do and maybe even how they do it.

Entry #4 Is it ethical to study people in cyberspace when they don’t they are being studied?

I think that is should follow the same rules as being studied in a public place like a park or a mall. It is a public space that everyone can see so it should be ok to gather data on public records.

Entry #5 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7)

  1. Multiple reasons
  2. For money
  3. Recognition
  4. Political
  5. Revenge
  6. Entertainment
  7. Boredom

I put multiple reasons first because I think that it is more likely for there to be more than one reason. Money is second because I think that for quite a few people money is a big motivator. Recognition is third because everyone wants to be recognized in some capacity. Political is fourth because it has many applications and could be for a variety of reasons. Revenge is in fifth because it seems like something someone angry would go to to get back at someone or whoever fired them. I put entertainment and boredom next to each other because I think they are the same, because they are not done for any other reason than because they can.

Entry #6 Which factors do you find most interesting for those seeking cybersecurity careers? (This video)

I think that the job security, getting into many different things, and always learning new things (although that might get tiring). These draw me into cybersecurity.

Entry #7 Create a meme for one of the photos explaining what is going on in the individual’s or individuals’ mind(s) using human systems integration framework.

https://unsplash.com/photos/ICTKcvnXx_8

Caption: How I feel when the program works how I want, while still keeping me secure

Entry #8 12-year old hacker and cybersecurity expert

It was great to see that someone so young can do what he is doing and that he is so passionate about it. He also is talking to people probably double his age about how to make cybersecurity better.

Entry #9 relate (this video) to class lectures about subcultures

I guess this music video could be linked to the scammer subculture. They talk about scamming together and how if they get caught they won’t work together anymore. This shows how loose they are connected to each other, which is typical of cybercriminal subcultures.

Entry #10 how the description of the cybersecurity analyst job relates to social behaviors using (this video)

She talks about how there are many titles for the job but they are all the same, but they might not be all viewed the same which might change social behavior. She talks about how this job might require you to be a “cybersecurity help desk” which would require you to be a good communicator. Also, she says that the job also involves fixing issues/vulnerabilities and that would require using teamwork if it is a large problem.

Social Media Disorder scale

Entry #11 Complete the Social Media Disorder scale

I had 2 yes/9 on the scale. I feel that the questions really get to the big problems of using social media too much, which are the attachment to it and the detachment from other things like duties or people you care about. The patterns may be different around the world because the culture may be focused on different things or have different beliefs.

Entry #12 Of the 11 which 5 are the worst?

I think Sharing Passwords, Addresses, or Photos of Others, Bullying and Trolling, Using Torrent Services, and Faking Your Identity Online are the worst. Sharing passwords, addresses, or photos of others is terrible because the information that you share could cause them a lot of trouble, for example if you share their address they might get stalked by someone or if you share their password their account could get taken over. I think bullying and trolling is bad for many reasons, there are many cases being covered that show cyberbullying being a bad thing and may end in suicide. Using torrent services is wrong because it takes revenue from the company or artist that created the work without being compensated for its use. Lastly, faking your identity because it is wrong to trick people into thinking you are someone you are not, like catfishing, and it is worse when you use someone else’s identity to steal from them.

Entry #13 How does ODU’s electronic communications policy relate to cybersecurity?

This policy states what is expected of everyone using communications through ODU. This is an important thing to set because it creates guidelines that people need to follow so both ODU and the user can stay safe. It also states how the data contained in the communications will be handled.

Entry #14 What does AI have to do with cybersecurity?

The new AI might be able to both help and harm cybersecurity. AI can help people set up, manage, and protect systems and networks. It may also be able to predict variabilities before they are hacked. It is also a likely that hackers will utilize AI to get into systems, as explained in the third video they could be used to create email scams and gather data.

Entry #15 How do the social sciences inform our understanding about the interconnection between AI and cybersecurity?

AI requires a lot of data to be useful, like how social sciences use lots of data to predict behaviors. AI tries to simulate how a human would think about a problem and how to solve it, much like how some social science research is done. This new perspective created by the AI helps cybersecurity in a similar way as the social sciences, they help cybersecurity employees make decisions or have insights on what should be done.

Used for both 14&15 : In the Age of AI (full film) | FRONTLINE – YouTube, How AI/ML Is Transforming Cybersecurity | Introduction To Cybersecurity | Edureka– YouTubeCybercriminals are using artificial intelligence! This is how you defend against offensive AI… – YouTube

Entry #16  What do you think about this statement?

I think that it a weird way to put it, but I get the idea behind it. Social media has become dangerous to people and specifically their self image. That can lead to many different things, one of which is potentially suicide due to not felling like that person belongs.

Entry #17 Why do you think victims don’t report cyber victimization?

I think that many people do not report things because of embarrassment, the idea that it won’t affect anything, and them not knowing they have been victimized. Many people might get embarrassed that they have been targeted, especially if it comes from a site they are embarrassed to be on,  so they choose not to report it because they don’t want anyone else to know. They might also think that no one will do anything if they report it because the laws on cybercrime are not specific and known, also they might think that it would be hard to catch the perpetrator. Many don’t even know that they were victimized because they don’t notice anything that changed or might not realize what happened, for example they may have downloaded a trojan horse or spyware which are not activated instantly.