journal entries

1)Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Some of the focuses in the NICE framework that I feel like appeal to me include Operate and Maintain, which is to provide support towards secure systems to prevent any malicious threats. Some of the specialty areas within this include Network services and technical support. Another focus includes protecting and defending, which identifies, analyzes and gets rid of threats that pose a danger to the users organizations. The reason I chose this is that this would fit within my dream job of a security operations center analyst, which uses cybersecurity techniques to defend their users’ information against hackers. 

Some of the focuses in the NICE framework that do not appeal to me include Investigation, which some of the specialty areas include cyber investigation, the reason I would not be as interested in this is that in my career I would rather be interested in defending systems rather than finding hackers.

2)Explain how the principles of science relate to cybersecurity.

The principles of science relate in many ways to cybersecurity. an example include relativism, which can be defined as “All things are related example the changes in one system lead to changes in other systems.” This can be related to cybersecurity as due to the internet age everything is connected to cybersecurity for example, if there was a hack into the health system it would lead to a hack and a loss of information it would fall into the cybersecurity sector to prevent this another example would be the economic system, as if a company were to be hacked and important information got leaked it could lead to a loss in there stocks, which again falls on cybersecurity to prevent.

3) Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? 

Researchers can use this data provided by privacyrights.org to study breaches by seeing the types of data breaches, the locations of data breaches and the organizations of the breaches. First, is the types of data breaches some examples include CARD, DISC, HACK, PHYS. As this can be important for researchers to see what is the most popular type of hacking which is done by Hacking. Next, is the location of data breaches, as this is important because it shows where the locations of the breaches are coming and can give researchers more information like why is it happening in this spot? Finally, researchers can use this data provided to see the organizations of the breaches, this is important as it shows what organizations get hacked the most and can show the types of organization that are getting hacked the most. For example we can see on the website the current most hacks are done to banks, this can be used as data to researchers who can use this information to make questions like why are banks the most popular spots for breaches? 

4) Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

First, the lowest level of the Hierarchy of needs would be physiological needs. This can be met with technology through ways such as Amazon or Instacart, as people can get orders such as food and water from there. Next, would-be safety and security is an example of this, and digital experiences is from applying for jobs online through websites like indeed or handshake, which can provide employment and money for property. Another example would include working from home, technology has advanced to the point where in some jobs people are now able to work from home and this can be another example because it provides safety and security still as people can work from home. Then would be love and belonging, this can be seen with phones allowing for communication for others which allows for love and belonging from across and screen all over the world due to text messaging and facetime. For self-esteem it would be from social media as people can post what they feel like aligns with their personality and getting likes can be seen as a way of getting more self-esteem/validation. Finally, would be Self Actualization, which could be seen as people who make a career off the internet, also known as influencers, as they can be as creative as they want alongside finding their purpose and meaning from being able to post whatever they want.  

5) Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

  1. Multiple reasons, as I believe this is the most sense as it involves reasons such as disregard of law, need of thrill factor, mental health issues as these all can factor into why they would commit cybercrime
  2. Revenge, this makes sense as people a lot of times can be upset and want revenge on others, this can be seen with deepfakes or ddos attacks where it can cause a lot of pain/damage back onto those whos started it.
  3. Recognition, as people who do this can do this for fame, such as groups like lizard squad as they gained fame for there attacks on the 2012 Christmas attack.
  4. Political, cyber attacks can be done for political reasons as to push a side or an agenda for their side or to send out a message for their side.
  5. For money, this can be done as people can extort others with their information, and will force them to pay a sum of money to receive it back.
  6. Boredom, this can be seen when they were bored and needed something to do with their time, as they will need something to do and if they have skills they can hack systems without getting caught.
  7. Entertainment, people can hack systems and commit cybercrime for their enjoyment and seeing people react can get a thrill out of them.

8) I think the media influences our view of cybersecurity in a way where it shows a lack of understanding. First reason why I believe this is from how they tend to use cybersecurity terms without fully knowing what the terms mean. This can be seen from the first example of the video where they use the term SQL injection as a futuristic space weapon would not use a sql injection as a way of hacking. Next would be the way the media makes up terms related to cybersecurity as to make them seem more an example would be within the video where it states omega site, which isnt a real term. A final example is how they misinterpret code, how they make code look completely different than what is actually is to get the audience involved

12) Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The first economic principle this article relates to is Liability, as the business took liability for the intrusion by taking statutory labilities known as criminal liabilities by trying to find the culprits and informing customers to search there accounts for any breaches. Next would be the information flow, as they used this way to communicate towards the customers although they had to wait awhile to communicate what happened and could result in lost of trust for the customers. After that the first social science theories that relate to this letter would be structural functionalist as the users understand that the methods the company is taking to prevent this is a way to build back trust and prevent there information from being leaked again. Another social science theory would be conflict perspective where the breach is seen as a privacy intrusion alongside the potential loss of data and money.

13) A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.  The policies relate to economics in that they are based on cost/benefits principles.  Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

There was a lot about this article I found informational some examples of this include, how companies were scared to receive reports of cybersecurity vulnerabilities from third party sources but due to times changing and more and cyber attacks happening within the day they are starting to switch to “bounties” which can be defined as where freelance hackers find bugs in corporate IT systems because of the increasing number of hackers rising on the daily. With this they were able to find many findings within the article of using hackers for bounties such as a hacker supply where there is actually too many hackers due to how cheap they are. In addition they also found that bug bounties are very helpful for finding hacks within the system to prevent breaches from happening. but the article emphasized how little they knew about the bug bounty markets due to how vast they were.