Journal entry #1
In the NICE framework, I’m interested in areas such as All Source Analysis, Cybercrime Investigation, and Defensive Cybersecurity. Although I am not sure what part of cybersecurity I want to be apart of yet, These areas intrigue me the most. All Source Analysis is apart of Cyberspace Intelligence which collects and analyzes information from one or more sources to conduct preparation of the operational environment. Cybercrime investigation investigates Cyberspace incidents and crime. This is done through numerous techniques and procedures with a full range of investigative tools. Defensive Cybersecurity is responsible for analyzing data from various Cybersecurity tools to mitigate risks. I feel I would be most inclined to work in positions like these as they appeal to me the most.
Journal entry #2
In this text, I will explain how the principles of science relate to Cybersecurity. Empiricism is when social scientists make conclusions on observable evidence that is real to the senses. In Cybersecurity, this means using data collected to understand threats and vulnerabilities. Determinism is a concept based on proceeding events, this suggests events follow a predictable pattern. In Cybersecurity, this can be used to predict events and stop them from happening. Parsimony is simplicity, in science this means to keep explanations simple and accessible. In Cybersecurity having explanations be too complex could create confusion and new risks. Objectivity is based on facts and research, it is also exempt from bias . Without objectivity in Cybersecurity, any data can be incorrect because of someone’s biases.
Journal entry #3
When researching about breaches, there are a plethora of ways to go about doing so. I believe all areas should be researched for because with more information on breaches, we’ll have the best chance at preventing them. The Privacy rights website has a ton of info on breaches from what I can see. They have the important stuff like when, where, and even what kind of breaches. This information is all important to have as you can see what breaches are most frequent or where they are happening most. with this information, Researchers can see what areas are or have been the most vulnerable as they have two decades of research and research across many states of America.
Journal entry #4
The hierarchy of needs are physical, safety, love/belongings, esteem/accomplishments, and self actualization. Physiological needs are food, water, warmth, etc. I have used technology to order me food , I see this as a way of tending to my physical needs. Safety is a very important need. Although technology can put you in a dangerous position, it can tend to your safety needs as well. I have security cameras around and in my house to protect my family and my house. Cameras can intimidate threats like burglars and warn the residents of unauthorized persons. Love can come in many ways throughout technology. I use my phone to connect to my loved one’s that I can’t see on a day to day basis. Self esteem can be boosted through your accomplishments. I would say I gain self esteem from doing well in school which is done through technology for the most part. Self actualization would be achieving my true potential. I use technology to help me think critically on things I might not think about. I also use it to gain knowledge on things I find interesting. The internet when used wisely can certainly help you self- realize.
Journal entry #5
I would rank “for money” as the 1st motive that makes the most sense. In today’s society, most financial transactions take place electronically. Taking money electronically can be difficult to trace as well. I would say for the 2nd would be political reasons. The internet has made it vastly easier for your voice to be heard, and as most are present on the internet, anything can be said or heard, political messages can be important for misrepresented groups of people. 3rd rank will go to entertainment as people find enjoyment out of taboo activities. Rank 5 will go to recognition because it’s very similar to how criminals in the real world go to commit extreme acts. Revenge gets ranked 6th because people can be very vengeful for whatever reason and the internet is an easy place to enact their revenge. I’ll rank boredom 7th because it’s the same as entertainment. Multiple reasons could be anything so I will be ranking it last.
Journal entry #6
A fake website is when a website tries to imitate another in order to trick people for their info.
One way to identify a fake website is that if it doesn’t include “https”. This means “Hypertext Transfer Protocol Secure” meaning the website is secure. Another way is the URL, fake websites will have similar name to the website is is trying to imitate. If the website has many pop ups, it is probably a fake one.
Journal entry #7
Journal entry #8
A lot of cyber-security and hacking representation in movies and television is fabricated and made to be much more than it actually is. In order to make things more interesting for viewers, media will make things much more unrealistic. Half of the films she is reviewing contain pretty accurate factors to actual hackers, but for the sake of entertainment a lot of the stuff happens pretty quickly and steps are skipped over. An example for something that isn’t realistic is when a guy hacked a bunch of cars to drive in different directions. Although unrealistic now, self driving cars are becoming more and more prevalent. Hacking cars to drive will soon be viable.
Journal entry #9
On the social media disorder scale I only scored one. The one time that I said yes to the use of social media was number 8. I have used social media and the internet as an escape, which I don’t view as being bad as long as it is used healthily. I think the items in the scale are very real to people as social media is made to be addicting. I used to be very unhealthily attached to social media so I know. It got to a point where I resented it. I took a long break and now am able to use it healthily.
Journal entry #10
Cybersecurity is a subdomain of National Security that is ever growing. I will effect all levels of warfare in the future. Also called “hybrid warfare”, information warfare has been and is a vital part of war, Information strengthens and empowers. Technology allows for powers to gain information more efficiently and much faster. If left unchecked, lack of information could cause failure. In cyber warfare, the target is information. The information of people and the society that binds them. Due to technology, a new war will be dominated by information. Strategies, locations, numbers, forces, are all information that technology currently holds.
Journal entry #11
Cybersecurity Analyst is the first line of defense when it comes to monitoring the network and defending it against attacks. It’s and entry level job. You respond to incidents and phishing attacks. Security Analyst’s are needed everywhere as technology in common use and stores information. The typical places that pay high for Cyber analyst have high living wages. Washington DC has the highest wages for Cybersecurity Analysts, New York as well. They tend to pay around 120 thousand dollars. Networking, certificates, experience, and a good resume will all help you become a Cybersecurity Analyst. IT and Computer science are good degrees for getting into Cybersecurity.
Journal entry #12
Both economic and psychological theories are at play are at play in the data breach letter. Economically, information asymmetry and behavioral economics shape how the company approaches the notification and tries to correct the imbalance of information and manage customer concerns. Psychologically, the company addresses cognitive dissonance and employs social proof to encourage individuals to take action and restore trust.
Journal entry #13
Bug bounties are programs where people are paid to find bugs in a companies systems. According to the article, most companies are afraid to receive reports on their vulnerabilities from third party researchers. This prevents companies from finding out about their vulnerabilities. As time passes their attitudes are rapidly changing towards it. Companies must do everything they can to cybersecurity weaknesses, so they can prepare for and prevent cyber attacks. The article or literature is encouraging enterprises to seek out freelance bug bounty hackers. Firms and companies that struggle to hire talented hackers go to bug bounty programs and hire freelance workers to find bugs.
Journal entry #14
This text is about eleven illegal things that are done unknowingly on the internet. Out of the eleven things, I will choose five that I believe are the most serious. For the first one I will say number nine is very serious. Collecting information about children is terrible as children can’t quite consent or grasp why they might need to keep their information private. Next I will be choosing faking your identity. Pretending to be someone you’re not is very harmful and deceitful to others. Third is bullying and trolling. A lot of people can’t enjoy the internet because they are scared of what others might say or do. The last two are using unofficial streaming services and Torrent services. These services provide content you would normally have to pay, for free. This means the people who put money into their content and services are losing money.
Journal entry #15
Digital forensics is the collection, analysis, and the reporting of various information that can be reported in the court of law. Digital forensics involves analyzing data left behind by individuals during criminal activities, such as emails, social media posts, or browsing history. In relation to social science we have learned, this has a lot to do with Human behavior. In the video, Davin Teo goes on about how he was a part of the first digital forensics team in Australia. A lot of what he describes in the beginning is about how much time it would take to find and save information. This was because technology wasn’t as advanced as it is now. I like how interested he is in his career. I see that particularly in how he described his story about how he and his team did an in depth investigation for a company. This company’s IT department was responsible for breaching policies. This video opened me to a career that I wasn’t aware of and am now interested in. I would like to learn how to collect data and data in the deleted space.