{"id":357,"date":"2025-04-21T18:54:58","date_gmt":"2025-04-21T18:54:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/corawilson\/?page_id=357"},"modified":"2025-04-21T19:02:04","modified_gmt":"2025-04-21T19:02:04","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/corawilson\/cyse-201s\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Journal Entry 1<\/strong><\/h2>\n\n\n\n<p><strong>Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas would appeal&nbsp;the most to you and which would appeal the least.<\/strong><\/p>\n\n\n\n<p>After reviewing the NICE Workforce Framework, I find that I\u2019m most interested in the<br>areas of Protect and Defend and Analyze. The Protect and Defend category aligns with my<br>background in cybersecurity, as it focuses on securing information systems and preventing<br>breaches. I am passionate about protecting organizations from cyber threats and ensuring data<br>integrity. The Analyze area also appeals to me, as it involves interpreting data to understand<br>security risks and trends, which is crucial for making informed decisions in cybersecurity.<br>On the other hand, the Operate and Maintain category would appeal the least to me.<br>While it\u2019s important for system operations to run smoothly, I find the more tactical and strategic<br>aspects of cybersecurity to be more engaging, such as protecting systems and analyzing threats.<br>These roles are important but do not excite me as much as those in defense and analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Journal Entry 2<\/strong><\/h2>\n\n\n\n<p><strong>Explain how the principles of science relate to cybersecurity.<\/strong><\/p>\n\n\n\n<p>The principles of science are foundational to cybersecurity as both disciplines rely on systematic methods to solve complex problems. One key scientific principle that directly applies to cybersecurity is observation and data collection. In science, careful observation and collection of data are crucial for understanding phenomena and making informed decisions. Similarly, in cybersecurity, collecting and analyzing data from networks, systems, and threats are essential to identifying vulnerabilities and developing strategies to protect information. For instance, logging network activity and monitoring systems are practices grounded in scientific observation, enabling cybersecurity professionals to detect anomalies or potential attacks.&nbsp;<\/p>\n\n\n\n<p>Hypothesis testing and experimentation are also central to both fields. In science, hypotheses are tested through controlled experiments to validate or invalidate theories. In cybersecurity, professionals conduct penetration tests and vulnerability assessments to test the resilience of systems against attacks. These experiments help identify weaknesses in security protocols and allow organizations to address these vulnerabilities before they are exploited by malicious actors. By systematically testing these hypotheses, cybersecurity experts can improve the defense mechanisms in place.&nbsp;<\/p>\n\n\n\n<p>Another relevant principle is analysis and pattern recognition. In scientific research, identifying patterns in data is essential for drawing meaningful conclusions and predicting future outcomes. Cybersecurity professionals use similar methods to analyze network traffic, system behavior, and attack patterns. Recognizing patterns, such as repeated unauthorized access attempts or unusual network behavior, allows security teams to predict and prevent potential cyberattacks. By detecting these patterns early, cybersecurity measures can be adjusted to protect sensitive data more effectively.&nbsp;<\/p>\n\n\n\n<p>The scientific process also emphasizes reproducibility and peer review. In science, experiments must be reproducible, and findings should be subjected to peer review to ensure their validity. In cybersecurity, solutions and defense strategies must be rigorously tested across different environments to ensure their effectiveness. For example, security patches and updates are tested in simulated environments before they are rolled out to production systems. Additionally, cybersecurity professionals frequently collaborate and share insights with peers to improve defense tactics, much like scientists refine theories through peer-reviewed research.&nbsp;<\/p>\n\n\n\n<p>Modeling and simulation are other scientific methods closely tied to cybersecurity. Scientists use models to simulate complex systems and predict outcomes. In cybersecurity, professionals use simulations to model potential attacks and test how systems will respond under threat. This helps identify vulnerabilities and evaluate the effectiveness of security controls before they are implemented in real-world scenarios. Tools such as firewalls and intrusion detection systems rely on these models to detect malicious activity and prevent attacks from succeeding.&nbsp;<\/p>\n\n\n\n<p>Finally, both science and cybersecurity involve continuous adaptation and evolution. Science is constantly evolving as new discoveries are made, and similarly, cybersecurity must adapt to emerging threats and technological advancements. As attackers develop new tactics, cybersecurity strategies must evolve to counter these threats. Just as scientific theories are refined over time based on new data, cybersecurity practices must also adapt to keep up with the rapidly changing landscape of cyber threats.&nbsp;<\/p>\n\n\n\n<p>In essence, the principles of science\u2014such as data collection, hypothesis testing, pattern recognition, reproducibility, simulation, and adaptation\u2014are integral to the practice of cybersecurity. By applying these scientific principles, cybersecurity professionals can develop more effective defenses and respond proactively to the dynamic nature of cyber threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Journal Entry&nbsp;<\/strong>3<\/h2>\n\n\n\n<p><strong>Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?<\/strong><\/p>\n\n\n\n<p>Privacy Rights Clearinghouse\u2019s Data Breach Chronology is an invaluable resource for researchers studying data breaches. With over 70,000 incidents spanning nearly two decades, this comprehensive database offers detailed information on breach types, affected entities, and compromised data. Researchers can analyze trends over time, assess the effectiveness of security measures, and identify vulnerabilities across various industries. The extensive collection of breach notification letters provides insights into organizational responses and regulatory compliance. By leveraging this data, scholars can contribute to the development of more robust data protection strategies and inform policy recommendations to enhance cybersecurity practice<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Journal Entry&nbsp;<\/strong>4<\/h2>\n\n\n\n<p><strong>Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/strong><\/p>\n\n\n\n<p>Maslow\u2019s Hierarchy of Needs provides a useful framework for understanding how technology plays a role in fulfilling different aspects of human motivation. According to Maslow, human needs are structured in a five-tier model, with lower-level needs requiring fulfillment before higher-level growth can occur. Here\u2019s how each level relates to my experiences with technology:<\/p>\n\n\n\n<ol>\n<li><strong>Physiological Needs (Basic Survival Needs)<\/strong><br>Technology helps meet basic needs such as food, water, and shelter. Online grocery delivery services and restaurant apps like Instacart and DoorDash provide convenient access to food, while smart home devices regulate living conditions for comfort (<em>Simply Psychology<\/em>, 2023).<\/li>\n\n\n\n<li><strong>Safety Needs (Security &amp; Protection)<\/strong><br>Cybersecurity plays a key role in ensuring safety. Strong passwords, multi-factor authentication, and antivirus software protect personal data. Additionally, smart security systems like Ring cameras and emergency alert apps enhance physical safety (<em>Verywell Mind<\/em>, 2023).<\/li>\n\n\n\n<li><strong>Love &amp; Belonging (Social Connections)<\/strong><br>Social media, messaging apps, and video calls help maintain relationships with friends, family, and colleagues. Platforms like Discord and LinkedIn foster social and professional connections, reducing feelings of isolation (<em>Positive Psychology<\/em>, 2023).<\/li>\n\n\n\n<li><strong>Esteem Needs (Recognition &amp; Achievement)<\/strong><br>Technology enables personal and professional growth through certifications, online courses, and achievements in digital spaces. For example, earning my Cybersecurity Specialist certification and sharing it on LinkedIn boosted my confidence and credibility in my field (<em>Simply Psychology<\/em>, 2023).<\/li>\n\n\n\n<li><strong>Self-Actualization (Personal Growth &amp; Fulfillment)<\/strong><br>Technology allows me to pursue passions such as interdisciplinary research, creative projects, and skill development. Whether working on my AI in cybersecurity research, exploring game development, or engaging in self-improvement, technology serves as a tool to achieve my highest potential (<em>Verywell Mind<\/em>, 2023).<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">References<\/h3>\n\n\n\n<ul>\n<li>Simply Psychology. (2023).&nbsp;<em>Maslow\u2019s Hierarchy of Needs: A Critical Analysis<\/em>. Retrieved from&nbsp;<a href=\"https:\/\/www.simplypsychology.org\/\">https:\/\/www.simplypsychology.org<\/a><\/li>\n\n\n\n<li>Verywell Mind. (2023).&nbsp;<em>Understanding Maslow\u2019s Hierarchy of Needs<\/em>. Retrieved from&nbsp;<a href=\"https:\/\/www.verywellmind.com\/\">https:\/\/www.verywellmind.com<\/a><\/li>\n\n\n\n<li>Positive Psychology. (2023).&nbsp;<em>Applying Maslow\u2019s Hierarchy to Modern Digital Life<\/em>. Retrieved from&nbsp;<a href=\"https:\/\/www.positivepsychology.com\/\">https:\/\/www.positivepsychology.com<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 5<\/h2>\n\n\n\n<p><strong>Review the articles linked with each individual motive in the presentation page or Slide #3. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.<\/strong><\/p>\n\n\n\n<p>To rank the motives from most to least plausible based on the articles linked with each motive, I would need to review the specific articles or presentation you mentioned, but I can provide a general outline of how I would approach this task based on common cybercrime motives. Here\u2019s how I might rank them:<\/p>\n\n\n\n<ol>\n<li><strong>Financial Gain<\/strong><br>This would be ranked #1 because financial gain is one of the most common and rational motives behind cybercrime. Hackers and cybercriminals can profit through various methods such as ransomware, credit card fraud, identity theft, and other schemes. It makes the most sense because it\u2019s the most direct and often successful method of achieving personal or group objectives.<\/li>\n\n\n\n<li><strong>Political or Ideological Motives<\/strong><br>Ranked #2, cyberattacks motivated by political or ideological beliefs (such as hacktivism) are common and make sense in a world where digital platforms are increasingly used for social activism, protests, or political gain. Groups like Anonymous demonstrate this type of cybercrime.<\/li>\n\n\n\n<li><strong>Revenge or Personal Vengeance<\/strong><br>This motive would be ranked #3. While it may not be as common as financial gain, personal grudges or revenge against individuals or organizations can certainly drive people to commit cybercrimes, such as doxxing, data breaches, or cyberstalking.<\/li>\n\n\n\n<li><strong>Corporate Espionage<\/strong><br>Ranked #4, corporate espionage involves stealing trade secrets or sensitive data from competitors. This makes sense as a motive since it offers financial or strategic benefits to those who can successfully pull it off. However, it tends to be less common compared to personal financial gain.<\/li>\n\n\n\n<li><strong>Curiosity or Thrill-Seeking<\/strong><br>This would rank #5. While some hackers are motivated by the challenge or thrill of breaching systems, this motive doesn\u2019t always lead to criminal intent. It\u2019s more common among novice hackers or \u201cwhite hat\u201d hackers, though some may cross into illegal activities.<\/li>\n\n\n\n<li><strong>Cyberbullying or Harassment<\/strong><br>Ranked #6, cyberbullying and harassment are serious issues, but they are more emotionally driven and can often be personal. While this is a notable motive, it doesn\u2019t have as broad a scale or global impact compared to financial or political motives.<\/li>\n\n\n\n<li><strong>Revenge Against Employers or Former Colleagues<\/strong><br>Ranked #7, this is a more niche motive but still relevant. It might make sense for disgruntled employees to seek revenge by stealing or exposing company data. However, it\u2019s a less widespread or systemic form of cybercrime than the others.<\/li>\n<\/ol>\n\n\n\n<p>I would rank these motives based on the likelihood of occurrence, scale, and impact. Financial gain, political ideology, and personal revenge stand out as the most prominent and impactful, while more specific or niche motives like revenge against an employer tend to rank lower.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 6<\/h2>\n\n\n\n<p><strong>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/strong><\/p>\n\n\n\n<p>Identifying fake websites is crucial to protect yourself from online scams and data theft. Let\u2019s compare three fake websites with their legitimate counterparts to highlight key differences and help you recognize red flags.<\/p>\n\n\n\n<p><strong>1. PayPal Phishing Site<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Fake Website:<\/strong>&nbsp;<code>paypa1.com<\/code><\/li>\n\n\n\n<li><strong>Real Website:<\/strong>&nbsp;<code>paypal.com<\/code><\/li>\n<\/ul>\n\n\n\n<p><em>Indicators of the Fake Site:<\/em><\/p>\n\n\n\n<ul>\n<li><strong>URL Anomalies:<\/strong>&nbsp;The fake site uses the numeral \u20181\u2019 instead of the letter \u2018l\u2019 in \u201cpaypal,\u201d a tactic known as typosquatting. Always double-check the URL for subtle misspellings or character substitutions. memcyco.com<\/li>\n\n\n\n<li><strong>Lack of HTTPS:<\/strong>&nbsp;Legitimate sites like PayPal use HTTPS (<code>https:\/\/<\/code>) to encrypt data. The fake site may use HTTP (<code>http:\/\/<\/code>) or have an invalid certificate. Look for a padlock icon in the address bar as a sign of a secure connection. digicert.com<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Apple ID Phishing Site<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Fake Website:<\/strong>&nbsp;<code>apple-support.com<\/code><\/li>\n\n\n\n<li><strong>Real Website:<\/strong>&nbsp;<code>apple.com<\/code><\/li>\n<\/ul>\n\n\n\n<p><em>Indicators of the Fake Site:<\/em><\/p>\n\n\n\n<ul>\n<li><strong>Misleading Domain Name:<\/strong>&nbsp;The fake site incorporates \u201capple\u201d and \u201csupport\u201d to appear legitimate but isn\u2019t an official Apple domain. Official Apple support pages are subdomains of&nbsp;<code>apple.com<\/code>&nbsp;(e.g.,&nbsp;<code>support.apple.com<\/code>). memcyco.com<\/li>\n\n\n\n<li><strong>Design and Content Quality:<\/strong>&nbsp;Fake sites often have poor design, low-quality images, or grammatical errors. Authentic Apple pages maintain high design standards and professionalism. bbb.org<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Netflix Credential Harvesting Site<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Fake Website:<\/strong>&nbsp;<code>netflix-login.com<\/code><\/li>\n\n\n\n<li><strong>Real Website:<\/strong>&nbsp;<code>netflix.com<\/code><\/li>\n<\/ul>\n\n\n\n<p><em>Indicators of the Fake Site:<\/em><\/p>\n\n\n\n<ul>\n<li><strong>Unusual Domain Structure:<\/strong>&nbsp;The fake site adds \u201c-login\u201d to the brand name, which isn\u2019t used by the official site. Be cautious of additional words or hyphens in the domain that differ from the official URL. memcyco.com<\/li>\n\n\n\n<li><strong>Requests for Unnecessary Information:<\/strong>&nbsp;Fake sites may ask for details that legitimate sites wouldn\u2019t, such as Social Security numbers or full credit card information during login. Always question why certain information is required.<\/li>\n<\/ul>\n\n\n\n<p><strong>General Tips to Identify Fake Websites:<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Check the URL Carefully:<\/strong>&nbsp;Look for misspellings, extra characters, or different domain extensions (e.g.,&nbsp;<code>.net<\/code>&nbsp;instead of&nbsp;<code>.com<\/code>). digicert.com<\/li>\n\n\n\n<li><strong>Look for HTTPS and a Padlock Icon:<\/strong>&nbsp;Secure sites use HTTPS and display a padlock icon in the address bar. However, some fake sites also use HTTPS, so this shouldn\u2019t be the sole indicator of legitimacy. digicert.com<\/li>\n\n\n\n<li><strong>Assess Design and Content Quality:<\/strong>&nbsp;Poor grammar, low-quality images, and unprofessional design can signal a fake site. Legitimate companies invest in high-quality web design. bbb.org<\/li>\n\n\n\n<li><strong>Use Website Checker Tools:<\/strong>&nbsp;Services like Get Safe Online\u2019s \u201cCheck a Website\u201d can help verify a site\u2019s legitimacy before you interact with it. getsafeonline.org<\/li>\n<\/ul>\n\n\n\n<p>By staying vigilant and paying attention to these details, you can protect yourself from falling victim to fake websites.<\/p>\n\n\n\n<p><strong>Works Cited<\/strong><\/p>\n\n\n\n<p>\u201c5 Recent Examples of Fake Websites.\u201d Memcyco, 5 months ago, https:\/\/www.memcyco.com\/5-recent-examples-of-fake-websites\/.<\/p>\n\n\n\n<p>\u201cHow to Identify Fake Websites.\u201d DigiCert, 2 months ago, https:\/\/www.digicert.com\/blog\/how-to-identify-fake-websites.<\/p>\n\n\n\n<p>\u201cBBB Tip: How to Identify a Fake Website.\u201d Better Business Bureau, https:\/\/www.bbb.org\/all\/spot-a-scam\/how-to-identify-a-fake-website.<\/p>\n\n\n\n<p>\u201cFree Website Scam Checker \u2013 Check a Website.\u201d Get Safe Online, https:\/\/www.getsafeonline.org\/checkawebsite\/.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 7<\/h2>\n\n\n\n<p><strong>Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"557\" height=\"373\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image.png\" alt=\"\" class=\"wp-image-320\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image.png 557w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-300x201.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-448x300.png 448w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This meme highlights the&nbsp;<strong>human factors<\/strong>&nbsp;in cybersecurity\u2014particularly user behavior and password hygiene. Despite knowing best practices, many individuals reuse weak passwords, making them vulnerable to cyber threats. HSI focuses on designing systems that encourage better security habits without overwhelming the user.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"545\" height=\"364\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-1.png\" alt=\"\" class=\"wp-image-322\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-1.png 545w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-1-300x200.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-1-449x300.png 449w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This meme reflects the&nbsp;<strong>cognitive workload and usability<\/strong>&nbsp;aspect of cybersecurity human systems integration. Most users don\u2019t fully read or understand privacy policies due to their complexity and length, leading to uninformed security decisions. Improving how privacy policies are presented (e.g., summaries, visuals) aligns with HSI goals of enhancing user comprehension and decision-making.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"692\" height=\"458\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-2.png\" alt=\"\" class=\"wp-image-323\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-2.png 692w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-2-300x199.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-2-453x300.png 453w\" sizes=\"(max-width: 692px) 100vw, 692px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This highlights the&nbsp;<strong>risk perception and user behavior<\/strong>&nbsp;aspect of cybersecurity HSI. Many users underestimate the consequences of poor password hygiene until they experience a security breach. HSI solutions could involve password managers, multi-factor authentication, and better user education to encourage safer practices.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"661\" height=\"499\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-3.png\" alt=\"\" class=\"wp-image-324\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-3.png 661w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-3-300x226.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-3-397x300.png 397w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This image highlights the&nbsp;<strong>work environment<\/strong>&nbsp;and&nbsp;<strong>human factors<\/strong>&nbsp;in cybersecurity. Working remotely in an unsecured location (like a rooftop) raises concerns about&nbsp;<strong>physical security, screen visibility (shoulder surfing), network security (public Wi-Fi risks), and ergonomic issues<\/strong>. Cybersecurity professionals must consider&nbsp;<strong>secure workspaces and encrypted connections<\/strong>&nbsp;when accessing sensitive data outside traditional office settings.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"559\" height=\"376\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-5.png\" alt=\"\" class=\"wp-image-326\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-5.png 559w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-5-300x202.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-5-446x300.png 446w\" sizes=\"(max-width: 559px) 100vw, 559px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This highlights&nbsp;<strong>usability, system reliability, and human performance<\/strong>&nbsp;in cybersecurity. Unexpected updates or security patches can disrupt workflows, leading to frustration and potential&nbsp;<strong>security workarounds<\/strong>, like postponing updates (which increases vulnerability). HSI emphasizes designing security measures that balance&nbsp;<strong>protection with user convenience<\/strong>, ensuring updates don\u2019t hinder productivity at critical moments.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"305\" height=\"410\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-6.png\" alt=\"\" class=\"wp-image-327\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-6.png 305w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-6-223x300.png 223w\" sizes=\"(max-width: 305px) 100vw, 305px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This relates to&nbsp;<strong>social engineering, phishing awareness, and human decision-making<\/strong>&nbsp;in cybersecurity. Cybercriminals exploit emotions like excitement to trick users into&nbsp;<strong>clicking malicious links or downloading malware<\/strong>. HSI emphasizes the need for&nbsp;<strong>user training, intuitive security alerts, and awareness programs<\/strong>&nbsp;to help individuals recognize and avoid online scams.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"270\" height=\"435\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-7.png\" alt=\"\" class=\"wp-image-328\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-7.png 270w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-7-186x300.png 186w\" sizes=\"(max-width: 270px) 100vw, 270px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This photo illustrates&nbsp;<strong>user behavior, privacy awareness, and the risks of oversharing<\/strong>&nbsp;on social media. While engaging with apps like Instagram, users may unknowingly expose personal information, which can lead to&nbsp;<strong>data breaches or social engineering attacks<\/strong>. HSI focuses on the importance of&nbsp;<strong>designing apps with better privacy controls<\/strong>&nbsp;and providing&nbsp;<strong>education<\/strong>&nbsp;on protecting personal data to reduce vulnerability in everyday use.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"379\" height=\"457\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-8.png\" alt=\"\" class=\"wp-image-329\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-8.png 379w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-8-249x300.png 249w\" sizes=\"(max-width: 379px) 100vw, 379px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This image highlights&nbsp;<strong>security practices and human trust in technology<\/strong>. Even with robust security measures like&nbsp;<strong>two-factor authentication (2FA)<\/strong>, users often have doubts about their own cybersecurity due to a lack of understanding of risks or overconfidence in system protections.&nbsp;<strong>HSI<\/strong>&nbsp;stresses the need for&nbsp;<strong>user-friendly security protocols<\/strong>&nbsp;and&nbsp;<strong>training<\/strong>&nbsp;that increase both&nbsp;<strong>user confidence<\/strong>&nbsp;and&nbsp;<strong>awareness<\/strong>&nbsp;of best practices to avoid vulnerabilities from human error or overestimating system security.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"556\" height=\"393\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-9.png\" alt=\"\" class=\"wp-image-330\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-9.png 556w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-9-300x212.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-9-424x300.png 424w\" sizes=\"(max-width: 556px) 100vw, 556px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This scenario focuses on the&nbsp;<strong>human factors<\/strong>&nbsp;of cybersecurity education, particularly the&nbsp;<strong>misalignment of expectations and understanding<\/strong>. Students might be more interested in learning the practical aspects of hacking or bypassing security systems, but they must first grasp&nbsp;<strong>fundamentals like network security protocols<\/strong>. HSI emphasizes the importance of&nbsp;<strong>engaging educational methods<\/strong>&nbsp;that balance practical skills with an understanding of security principles to ensure that students don\u2019t just focus on vulnerabilities but also on&nbsp;<strong>ethical behavior, system protection, and resilience<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"614\" height=\"438\" src=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-10.png\" alt=\"\" class=\"wp-image-331\" srcset=\"https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-10.png 614w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-10-300x214.png 300w, https:\/\/sites.wp.odu.edu\/corawilson\/wp-content\/uploads\/sites\/37227\/2025\/03\/image-10-421x300.png 421w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/figure>\n\n\n\n<p><strong>HSI Connection:<\/strong><br>This scenario underscores the&nbsp;<strong>privacy risks<\/strong>&nbsp;and&nbsp;<strong>unintentional data sharing<\/strong>&nbsp;that come with modern technology. While taking a photo, location data (via GPS) can be embedded into the image\u2019s metadata, unknowingly sharing the user\u2019s location. HSI stresses the need for&nbsp;<strong>privacy controls, user awareness<\/strong>, and system design that&nbsp;<strong>limits automatic location sharing<\/strong>&nbsp;unless explicitly allowed by the user. This situation highlights the balance between convenience and security in personal devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 8<\/h2>\n\n\n\n<p><strong>Watch this video and pay attention to the way that movies distort hackers.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? \u2013 YouTubeLinks to an external site.<\/strong><\/a><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\"><\/a><\/p>\n\n\n\n<ul>\n<li><strong>After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Media Influence on Cybersecurity Perception<\/strong>&nbsp;<\/p>\n\n\n\n<p>The way Hollywood portrays hacking in movies and TV shows has significantly shaped public perception of cybersecurity, often in ways that are misleading or exaggerated. After watching the video \u201cHacker Rates 12 Hacking Scenes In Movies And TV,\u201d media depictions of hacking tend to be overly dramatic, unrealistic, and sometimes outright absurd. These portrayals create misconceptions about what hacking entails and can contribute to misinformation about cybersecurity.&nbsp;<\/p>\n\n\n\n<p>One of the most common distortions in media is the idea that hacking happens in seconds. Movies frequently show hackers rapidly typing on a keyboard while green code flashes across multiple screens, instantly bypassing highly secure systems. Hacking is a slow and methodical process that requires extensive research, social engineering, and technical knowledge. It is not just about guessing passwords or breaking into systems with a single command.&nbsp;<\/p>\n\n\n\n<p>Another misleading aspect is the overuse of visual effects and high-tech user interfaces. Real-world cybersecurity professionals use standard command-line interfaces and tools rather than futuristic, holographic displays. The exaggerated visuals give the impression that hacking is more about flashy technology than deep technical expertise and patience.&nbsp;<\/p>\n\n\n\n<p>Additionally, the portrayal of hackers themselves is often unrealistic. In movies, they are frequently depicted as either lone geniuses working in dimly lit rooms or cybercriminal masterminds pulling off impossible heists. While there are certainly skilled individuals in cybersecurity, real-world hacking is usually a collaborative effort, often conducted by teams rather than solitary figures.&nbsp;<\/p>\n\n\n\n<p>These distorted portrayals can have real-world consequences. For one, they contribute to fearmongering by making hacking seem like an unstoppable force that can penetrate any system instantly. This can lead to unnecessary panic about cybersecurity threats while also downplaying the importance of fundamental security practices, such as strong passwords and multi-factor authentication. On the other side, some people may underestimate cybersecurity threats, believing that real hacking only happens in high-stakes government scenarios rather than being a risk for everyday users.&nbsp;<\/p>\n\n\n\n<p>While movies and TV shows are meant for entertainment, it is important to recognize that their depictions of cybersecurity are not always accurate. A more informed public would benefit from realistic portrayals that emphasize the complexity of hacking, the importance of cybersecurity measures, and the ethical dilemmas that cybersecurity professionals face. As cybersecurity threats continue to evolve, media should strive to provide a more balanced and educational perspective rather than relying on outdated stereotypes and Hollywood tropes.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 9<\/h2>\n\n\n\n<p><strong>Watch this Video:<a href=\"https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw\" target=\"_blank\" rel=\"noreferrer noopener\">Social media and cybersecurityLinks to an external site.<\/a><\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw\"><\/a><\/p>\n\n\n\n<p><strong>Complete the&nbsp;<a href=\"https:\/\/www.brieftherapyconference.com\/download\/handouts\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Social Media Disorder scaleLinks to an external site.<\/a>.&nbsp; How did you score?&nbsp; What do you think about the items in the scale?&nbsp; Why do you think that different patterns are found across the world?<\/strong><\/p>\n\n\n\n<p>I completed the Social Media Disorder (SMD) Scale and scored&nbsp;<strong>4 out of 9<\/strong>. This suggests that while I may have some problematic tendencies with social media use, it\u2019s not necessarily a full-blown addiction. Still, it made me reflect on how often I reach for my phone out of habit rather than necessity.<\/p>\n\n\n\n<p>The items in the scale were interesting because they closely mirrored addiction criteria, like withdrawal, preoccupation, and conflict with responsibilities. While I think the scale does a good job identifying problematic behaviors, it doesn\u2019t consider the context\u2014someone could use social media frequently for work, school, or staying connected rather than as an unhealthy escape.<\/p>\n\n\n\n<p>I also found it fascinating that social media disorder patterns vary worldwide. Culture plays a big role\u2014some societies encourage constant digital interaction, while others place more value on in-person relationships. Technology access also affects usage; wealthier countries with widespread internet tend to have higher social media engagement, while places with restrictions (like China) experience different online behaviors. Even economic and social factors shape how people interact with social platforms.<\/p>\n\n\n\n<p>Overall, this exercise made me more aware of my social media habits. I wouldn\u2019t say it significantly affects my daily life, but it\u2019s something to keep an eye on. Maybe setting limits or taking breaks more often wouldn\u2019t be such a bad idea.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 10<\/h2>\n\n\n\n<p><strong>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site.<\/a><\/strong><\/p>\n\n\n\n<p>The article on social cybersecurity emphasizes the interconnectedness of technology, society, and cybersecurity. It argues that social vulnerabilities, such as human behavior, are often the weak points exploited by cyber-attacks, making social aspects of cybersecurity just as crucial as technical defense. It advocates for a multidisciplinary approach, integrating sociology, political science, and technology to defend against these threats. The article also highlights the importance of understanding societal values and trust when addressing cybersecurity challenges.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 11<\/h2>\n\n\n\n<p><strong>Watch this&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">videoLinks to an external site.<\/a>.&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>As you watch the video&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\"><\/a>, think about how the description of the cybersecurity analyst job relates to social behaviors.&nbsp; Write a paragraph describing social themes that arise in the presentation.<\/strong><\/p>\n\n\n\n<p>The video about the cybersecurity analyst role delves into how social behaviors significantly shape the profession. Analysts must continuously collaborate, demonstrating that effective communication within teams is key to tackling cyber threats. The role also stresses how human behavior impacts security, as attackers often exploit social engineering tactics, such as phishing or deception. As cybersecurity professionals protect networks and data, they must balance technical expertise with understanding human vulnerabilities. Thus, the role intertwines technical proficiency with social awareness, making the human aspect essential to cybersecurity defense. This highlights a deep interaction between technology and social behaviors in safeguarding against cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 12<\/h2>\n\n\n\n<p><strong>Read this&nbsp;<a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.<\/a>&nbsp;sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Analysis of the Data Breach Notification Letter<\/h3>\n\n\n\n<p>The&nbsp;<strong>Sample Data Breach Notification<\/strong>&nbsp;letter from Glasswasherparts.com illustrates several economic and social science theories. Two economic theories\u2014Rational Choice Theory and Laissez-Faire Economic Theory\u2014help explain the business decisions leading up to the breach and the government\u2019s role in handling the situation. Additionally, two social science theories\u2014Neutralization Theory and Social Contract Theory\u2014highlight the ethical and societal implications of the breach.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Economic Theories<\/h4>\n\n\n\n<p><strong>Rational Choice Theory<\/strong>&nbsp;posits that individuals and businesses make decisions by weighing costs and benefits to maximize their advantage (Becker, 1976). In the letter, the company explains that the breach occurred due to malware on their platform provider\u2019s systems, suggesting that outsourcing their e-commerce operations was a calculated decision based on efficiency and cost-effectiveness. However, this choice introduced vulnerabilities, underscoring the trade-offs businesses face when outsourcing cybersecurity risks.<\/p>\n\n\n\n<p><strong>Laissez-Faire Economic Theory<\/strong>&nbsp;advocates for minimal government intervention in business operations, allowing the free market to regulate itself (Smith, 1776). The company states that law enforcement was involved only after the breach occurred, reflecting a reactive approach rather than proactive government regulation. This aligns with laissez-faire principles, where regulatory bodies intervene mainly in response to crises rather than enforcing strict preventative measures.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Social Science Theories<\/h4>\n\n\n\n<p><strong>Neutralization Theory<\/strong>&nbsp;explains how individuals or organizations justify unethical behavior to neutralize guilt (Sykes &amp; Matza, 1957). In the letter, the company shifts responsibility by attributing the breach to its platform provider and mentioning that law enforcement requested a delay in notifying customers. By deflecting blame, the company attempts to maintain its reputation and lessen the perception of negligence.<\/p>\n\n\n\n<p><strong>Social Contract Theory<\/strong>&nbsp;argues that society functions based on mutual agreements between individuals and institutions (Rousseau, 1762). Customers trust businesses to protect their sensitive information when conducting transactions. The data breach represents a violation of this trust, damaging the implicit social contract. The notification letter serves as an effort to restore trust by informing customers about the breach and offering guidance on protective measures.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">References<\/h3>\n\n\n\n<p>Becker, G. S. (1976).&nbsp;<em>The economic approach to human behavior<\/em>. University of Chicago Press.<\/p>\n\n\n\n<p>Rousseau, J. J. (1762).&nbsp;<em>The social contract<\/em>.<\/p>\n\n\n\n<p>Smith, A. (1776).&nbsp;<em>The wealth of nation<\/em>s.<\/p>\n\n\n\n<p>Sykes, G. M., &amp; Matza, D. (1957). Techniques of neutralization: A theory of delinquency.&nbsp;<em>American Sociological Review, 22<\/em>(6), 664-670.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 13<\/h2>\n\n\n\n<p><strong>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost\/benefits principles. Read this article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.<\/strong><\/p>\n\n\n\n<p>Bug bounty programs (BBPs) have emerged as a strategic cybersecurity approach that incentivizes external researchers to identify vulnerabilities in an organization\u2019s cyber infrastructure. These programs are rooted in economic principles, particularly&nbsp;<strong>cost-benefit analysis<\/strong>, as companies assess whether paying ethical hackers for discoveries is more cost-effective than experiencing a breach (Marotta et al., 2021).<\/p>\n\n\n\n<p>The&nbsp;<strong>literature review<\/strong>&nbsp;on BBPs highlights several key factors that influence their effectiveness. First, the&nbsp;<strong>scope of BBPs<\/strong>&nbsp;is critical, as defining clear objectives ensures that researchers focus on areas of highest concern, optimizing resource allocation and addressing the most critical vulnerabilities. Additionally, the&nbsp;<strong>timing of crowd engagement<\/strong>&nbsp;plays a role in the efficiency of vulnerability discovery, with strategically planned programs yielding better security outcomes (Marotta et al., 2021).<\/p>\n\n\n\n<p>Another critical factor is the&nbsp;<strong>quality of vulnerability submissions<\/strong>. Organizations must establish clear guidelines to ensure reported issues are well-documented and actionable. Furthermore,&nbsp;<strong>firm-researcher communication<\/strong>&nbsp;is essential for maintaining trust and efficiently resolving vulnerabilities. The motivation of ethical hackers also influences the program\u2019s success, as factors such as&nbsp;<strong>monetary rewards, recognition, and the challenge itself<\/strong>&nbsp;drive participation (Marotta et al., 2021).<\/p>\n\n\n\n<p>The discussion on BBPs also acknowledges potential challenges. While these programs can significantly enhance security, they require careful management to avoid inefficiencies. Issues such as&nbsp;<strong>defining clear program scopes, ensuring fair compensation, and maintaining transparent communication channels<\/strong>&nbsp;are pivotal to their success. If managed effectively, BBPs serve as a proactive approach to cybersecurity, allowing organizations to leverage external expertise to strengthen their defenses while maintaining cost-effectiveness (Marotta et al., 2021).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>References<\/strong><\/h3>\n\n\n\n<p>Marotta, A., Martinelli, F., Nanni, S., Orlando, A., &amp; Yautsiukhin, A. (2021). A survey on cyber security bug bounty programs: Investigating the best practices, security threat coverage, and impact.&nbsp;<em>Journal of Cybersecurity, 7<\/em>(1), 1-22.&nbsp;<a>https:\/\/doi.org\/10.1093\/cybsec\/tyab007<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 14<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy&nbsp;Links to an external site.<\/a>&nbsp;<a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">SlynchukLinks to an external site.&nbsp;Links to an external site.<\/a>&nbsp;has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/strong><\/p>\n\n\n\n<p>In his article&nbsp;<em>\u201c11 Illegal Things You Unknowingly Do on the Internet,\u201d<\/em>&nbsp;Andriy Slynchuk outlines several online behaviors that are surprisingly unlawful. Among these, the five most serious violations include collecting information about children under 13, faking your identity online, engaging in cyberbullying or trolling, recording VoIP calls without consent, and using someone else\u2019s Wi-Fi without permission. Collecting data on minors without parental consent directly violates the Children\u2019s Online Privacy Protection Act (COPPA) and puts children at risk of exploitation, identity theft, and other long-term consequences\u2014making it one of the most egregious offenses. Similarly, impersonating someone online or creating fake identities can constitute fraud and be used to commit scams, harassment, or even cyberstalking, all of which erode public trust in digital spaces. Cyberbullying and trolling, while sometimes dismissed as harmless, can have devastating emotional and psychological effects, especially on young or vulnerable users. These behaviors often escalate into criminal harassment and can result in serious legal consequences. Recording VoIP calls without the other party\u2019s knowledge violates wiretapping laws in many states and is a major breach of privacy. Lastly, accessing someone else\u2019s internet network without permission may seem minor, but it constitutes theft of service and can be exploited to commit more serious cybercrimes anonymously, implicating the network owner in illegal activity. These offenses are serious not only because of their legal ramifications but because they threaten the safety, privacy, and well-being of individuals and communities online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 15<\/h2>\n\n\n\n<ul>\n<li><strong>Digital Forensics | Davin Teo | TEDxHongKongSalon<a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\" target=\"_blank\" rel=\"noreferrer noopener\">\u2013 YouTubeLinks to an external site.&nbsp;<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\"><\/a>Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/strong><\/li>\n<\/ul>\n\n\n\n<p>After watching Davin Teo\u2019s TEDx talk on digital forensics, I was really struck by how his career connects to both technology and social sciences in unexpected ways. Teo\u2019s pathway into digital forensics wasn\u2019t some straight, obvious line \u2014 it was shaped by curiosity, problem-solving, and a strong understanding of human behavior. What stood out to me was how he emphasized that behind every digital crime is a person making decisions, leaving behind traces of their actions. This ties directly to social sciences because understanding why people commit digital crimes, how they think, and what patterns they follow is just as important as the technical work of recovering data or cracking encrypted files.<\/p>\n\n\n\n<p>Teo made it clear that digital forensics isn\u2019t just about computers; it\u2019s about people. Investigators in this field need to read between the lines, consider motives, and understand social interactions \u2014 both online and offline \u2014 to build a full picture of what happened. His career shows how critical social science concepts like psychology, sociology, and criminology are when it comes to interpreting digital evidence and behavior. I think it\u2019s a perfect example of how tech careers are becoming more interdisciplinary, blending technical skills with a deep understanding of human nature and society. Teo\u2019s story reminded me that careers in cybersecurity and digital forensics aren\u2019t just about machines \u2014 they\u2019re about people too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry 1 Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas would appeal&nbsp;the most to you and which would appeal the least. After reviewing the NICE Workforce Framework, I find that I\u2019m most interested in theareas of Protect and Defend and Analyze. The [&hellip;]<\/p>\n","protected":false},"author":29782,"featured_media":0,"parent":302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/357"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/users\/29782"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/357\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/357\/revisions\/365"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/media?parent=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}