Journal Entry #1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
Considering that you could take vastly different career paths in Cybersecurity, I am interested in Investigation, Protection, and Defense. More specifically, in Protection and Defense, this is due to my Military background; I would like to continue my service providing security and defense on a national security scale. To piggyback onto that with investigation and digital evidence analysis is another career path that heavily interests me as I continue my job search in the future. It was hard to choose which career areas I wasn’t interested in; however, if I had to pick one, it would be Design and development. While not as a whole area, I do not have the creative abilities to excel in this area.
Journal Entry #2
Explain how the principles of science relate to cybersecurity.
The principles of science relate to cybersecurity in various ways, specifically parsimony and relativism. Regarding parsimony in cybersecurity, it is paramount to keep things simple, especially in the expansive space and field of cybersecurity, where the systems that fall under that umbrella can be overwhelming. In addition, maintaining simplicity also helps with integration with other sectors of science and business. With relativism, it ties in with parsimony but rather in dealing with related things. In the cybersecurity space, many systems relate to each other, and their systems changing means the way we do business in cybersecurity will also change.
Journal Entry #3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
When I looked into PrivacyRights.org, I found an abundant amount of data that researchers can use for various purposes and topics. I especially found that their search tool was very effective at getting specific information on certain breaches, whether by state, year, type of breach, etc. Researchers could use the data presented on the website to support their topic regarding breaches but also teach colleagues or superiors the importance of securing data, whether it is company or private. In addition to access to other reports, legislation, and advocacy, further information can be presented that can be used to gather more insight into their purpose.
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
When reviewing the Maslow Hierarchy of Needs, I saw and related to every level regarding technology—starting with the lowest level of psychological needs, which are food, water, rest, etc. Technology relates to this level with how versatility can relieve stress in certain aspects of life, supporting the rest needed. The next step of the pyramid is safety needs, and cybersecurity relates to all aspects of this level because whether it is bank app use on your mobile device or your home cameras, cybersecurity provides safety. I can specifically relate to the next level of belonging and love needs because, due to technology, I can still contact my family and friends who live in South Florida while I have been living in Virginia for eight years. At the esteem needs level, I often share my accomplishments on social media to fulfill that sense of accomplishment. It also plays a part when I am away from family to share those moments with them. The final self-actualization level supports creative activities, which is limitless in the world of technology, and specifically relates to this as I continue to fulfill my true potential in cybersecurity.
Journal Entry #5
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- Revenge
I ranked Revenge #1 due to the emotional element that revenge manifests in someone. Revenge is a powerful feeling that drives individuals to go above and beyond often to get payback to someone or group they feel they were wronged by.
- Money
Money is in 2nd, similar to revenge; when someone is put in a position of financial hardship, they may seek crime to resolve their issues. In this, I am picturing the lack of money pushing someone into a corner where they would get desperate to escape.
- Recognition
Recognition is 3rd because, again, it attacks that emotional element in a person. In this case, it is in the form of the feeling of achievement and being noticed. Very common from hackers is that they want to display what they can do simply for recognition.
- Entertainment
Contrary to recognition, the entertainment motive is not looking to be noticed but to seek enjoyment from committing the act. I am placing this at four because it is weaker than the other three at pushing someone’s emotions.
- Political
While political views, more recently, have been solid emotional motivators to cause malice, political views as a whole or majority are not as much of a driving motive.
- Multiple reasons
I have multiple reasons so low on this list because it doesn’t fit with the rest on a singular motive. Usually, various motives are involved in crimes, so this category didn’t belong, in my opinion.
- Boredom
Boredom is at the bottom of the list mainly because it relates to entertainment. People will seek a motive to commit an act to cure their boredom, which would be their form of entertainment.
Journal Entry #6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
Note: Don’t generate or click on unwanted/fake websites on your web browsers.
Showcase with examples, what makes the fake websites fake.
Spotting fake websites is incredibly important, especially given the ease with which current technologies can generate websites rapidly. Multiple factors can be considered when deciding what is real and what is fake.
- Fake: CashJobs.com
- Fake job recruiting websites often relay fake compensation for the job published.
- Requests personal information such as social security numbers.
- A big sign is ads unrelated to the website.
Real: Linkedin.com
- Organized interface
- The clear objective with targeted adds to your search
- Secured application options and access.
- Fake: freeamazon.com
- Fake shopping e-commerce stores. Take advantage of selling off-brand replicas or a scam altogether.
- The lack of a customer service number or a “contact us” page is a telltale sign of a fake website.
- Poor design or layout also shows signs of the website being fake
Real: Amazon.com
- Credible shopping sources are used widely worldwide with expansive customer service options.
- Heavily detailed product descriptions with verified reviews.
- Secured payment options are available.
- Fake: CheapHoliday.com
- Often overlooked are vacation websites offering unrealistic deals for the services provided.
- Unclear contact info or booking contacts
- The urgency to book is unrealistic.
Real: Booking.com
- A detailed review of the booking with contact information and cancellation policies.
- Expansive customer support with contact emails for all booking steps.
- Transparent pricing with limited ads
Journal Entry #7
Explain how your memes relate to Human-centered cybersecurity.
With the first meme I created, I wanted to emphasize that many companies are now requiring password entry applications. However, I feel you should implement these requirements for all personal applications as well because it is up to us as users to create and protect our data using passwords that are difficult to predict and not simple to remember.
The meeting meme I made embarrassingly made me laugh because while in the Navy when we had a shortcoming, it would be brought up in every meeting until it was solved. This should be the same way corporate companies view cybersecurity. If there is a constant reminder that personal security is lapsing with subsequent training, it can be solved and become a conscious belief within the company.
Lastly, I have another mention of 2FA (two-factor authentication) because this has personally saved me from so many different unauthorized access events. I had an email that required 2FA, and I would receive endless messages of suspicious activity. So, in the view of human-centered cyber security, utilizing the technologies that support cybersecurity to protect our personal information is paramount.
Journal Entry #8
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
After reviewing the video, it was clear which movies were prepared and well-informed on modern hacking capabilities. The films that depicted exaggerated methods of hacking crowded the scene with sophisticated jargon and catastrophic effects from the hacks in the movie. This pushed the agenda of creating a fear of the unknown and glamorizing how polarizing some hacks can be. On the flip side, films that depict accurate views of hackers can give the audience a proper idea and a vague understanding of what could be happening in the real world. With this approach, we could use the platform to educate and entertain the masses about cybersecurity.
Journal Entry #9
JE #9
Complete the Social Media Disorder How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pintrist, forums, weblogs) in past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine) criteria must be met for a formal diagnosis of “disordered social media user”.
During the past year have you…
1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again?
Yes/No (Preoccupation).
NO
2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance).
NO
3. Often felt bad when you could not use social media?
Yes/No (Withdrawal).
NO
4. Tried to spend less time on social media, but failed?
Yes/No (Persistence).
YES
5. Regularly neglected other activities (i.e. hobbies, sports, homework) because you wanted to use social media?
Yes/No (Displacement).
NO
6. Regularly had arguments with others because of your social media use? Yes/No (Problems).
NO
7. Regularly led to your parents or friends about the amount of time you spend on social media? Yes/No (Deception).
NO
8. Often used social media to escape from negative feelings?
Yes/No (Escape).
NO
9. Had serious conflict with parents, brother, sister (friends, relationships etc.) because of your social media use?
Yes/No (Conflict).
NO
9-item scale measures adolescents degress of addiction to social media. Based on scale from Internet Gaming Disorder found in the DSM-V, for preoccupation, tolerance, escape,
Van den Erjnden, RJ.J.M., Lemmons, J.S., & Valkensburg P.M. (2016). The Social Media Disorder Scale. Computers in Human Behavior, 61, 478-487.
When filling out the Social Media disorder scale, I scored 1 out of 9, which is unsurprising. I found the questions very direct; however, they made the individuals honest with themselves to complete and get accurate scores. In addition, the scale did not fit me personally because I did not grow up with the quick rise of social media, and today, I am still very limited in its exposure and use. There are different patterns around the world because of economic differences. Internet and access to the world are limited, which directly affects the culture in how information and entertainment are consumed. However, in the United States, economic status plays a role in social media use by being dictated and limited in how often and the type of work people do.
Journal Entry #10
Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/
While reading the article, the author expressed the importance of social cybersecurity on a national security level. This article aged well, considering it was written in 2019. In 2024, cybersecurity and personal cybersecurity are paramount concerns for everyone. In the military sector, every military branch now has a dedicated Cyber division to fulfill national security needs. Two of the most extensive efficiencies of social cybersecurity are decentralization and the absence of physical appearance. Many outlets nowadays are no longer checked by the company that runs them but rather by the consumers, whether it is news or education. How technology has advanced has bred decentralization, and so many have voices now. In addition, a lot of everyday transactions are no longer in person. As long as they develop, there will be a continued dilemma that current and future cybersecurity professionals will face.
Journal Entry #11
Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
While watching the video, I believed there were apparent social behaviors a future cybersecurity analyst must have. One of the key ones is practical communication skills because this skill allows the branches of other skills, such as educating teams and leading training for the company. In addition, explaining technical information to non-experts in your sphere or coordinating incidents for seamless collaboration. It is important to note that these skills aren’t directly involved with cybersecurity; however, that is the social theme with cybersecurity as it has now become a shared responsibility. This all ties together social cybersecurity and the importance of cybersecurity professionals understanding the facets of it.
Journal Entry #12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Links to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
While reading the sample breach letter, I felt the economics theory that can be connected could be spun to fit more specifically rational choice theory and classic economic theory. For rational theory, the company made the decision they felt was best on who controlled their information. The company’s failure to hold their information may not be their fault, but they are still expected to be responsible. Regarding the classical theory, it seems “Glass Washer Parts” used the demand for a website in which the “provider” supplied it. Still, depending on the budget, it may have manipulated the company’s security.
Journal Entry #13
Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Links to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
When reading the article and reviewing the background literature review and the findings, my reaction was in complete support of bug bounty programs. I aligned with the literature review, alluding to the cost-effectiveness of these bounties. While they may have to pay the bounties if the bug is accomplished, it is more cost-effective than having someone employed full-time focused on finding bugs. Now, that does come with negatives; simultaneously, you miss the opportunities to have subject matter experts on your program, which in the long run can benefit you by having the expertise. Reviewing the findings, it is nice to see that while there is a reward in the form of money, the amount did not dictate motivation, suggesting that factors went beyond money and leaned more toward reputation building and building their expertise.
Journal Entry #14
Andriy
has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
When reading Andriy’s article discussing activities that internet users may be doing illegally, out of the eleven, five stood out to me more than others. Not in any particular order, starting with “Collecting information about Children.” This is not only illegal but ethically wrong. There should be zero collection of minors’ information on business and social levels. Ethically, the avenues of acquiring information should go through the parents because terrible actors can have malice on children’s information. “Sharing Passwords, Addresses, or Photos of Others” goes hand in hand with the previous one, where bad actors can use this information as a gateway to further crime. People have an inherent right to privacy. “Faking Your Identity Online” ties into the previous illegal act because, usually, when personal information is shared online, Fake identity comes quickly after the information is shared online. Bad actors can accomplish many things by using someone else’s name. “Bullying and Trolling” are illegal in person and online and should not be tolerated at any age level. Bullying and Trolling have a long-term effect on the victim and should not be taken lightly. “Extracting Audio From YouTube” is not as extreme as the others; I feel this is serious because you directly affect the monetary value of the creator of the audio and video.
Journal Entry #15
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
After watching the video, Teo put in perspective that the occupation of digital forensics is intertwined with an understanding of social science. It is interesting to start with Teo’s beginning as an accountant, which is datasheet-heavy and needs to concentrate more on social science. This led to his interest in IT and eventually a career in digital forensics. He highlights the importance of adaptability and leveraging unique skill sets to transition to a new field. While transitioning from accountant to digital forensics, he emphasized that understanding discretion, trust, and organizational culture were paramount to his success. That covers just a few social science qualities needed to be successful. Teo continues by discussing some ethical dilemmas he faced, like balancing the need to uncover truth with respect for privacy and legal boundaries. Digital forensics goes hand in hand with understanding social science for paramount success.