CYSE 201S

Journal Entries

  1. I would want to focus my career on investigating and protecting. These two areas appeal to me the most because collecting data and seeing different techniques used can help you learn a lot. This will make it easier for to them take that information and implement it into protection. Overseeing or governing the many programs, data, and policies appeals the least to me.
  2. Cybersecurity relates to the principles of science through relativism, objectivity, parsimony, empiricism, and determinism. Relativism explains how things are related through a cause-and-effect chain. Objectivity refers to the different perspectives that are studied and then reported on without bias. Keeping explanations in simple terms is how parsimony works. Empiricism deals with scientific knowledge to avoid opinions and guesses. Determinism is explained as things are determined by past events. 
  3.  The information found on the PrivacyRights.org website gives insight into how many breaches have occurred in the United States. It also provides a breakdown of which states had the highest or lowest and gives that exact statistic. It gives the option to look into types of data breaches and the types of organizations that were targeted the most. Although the data is full of public information and it is stated on the website that it may not be completely accurate, it is still a good source of information for researchers to get an idea. 
  4.  The information found on the PrivacyRights.org website gives insight into how many breaches have occurred in the United States. It also provides a breakdown of which states had the highest or lowest and gives that exact statistic. It gives the option to look into types of data breaches and the types of organizations that were targeted the most. Although the data is full of public information and it is stated on the website that it may not be completely accurate, it is still a good source of information for researchers to get an idea. 
  5. I would rank the motives in order of importance starting with, psychological, for money, for recognition, for revenge, political, entertainment, and boredom. I rank psychological first because in some cases, this cannot be controlled because of a mental issue. For-profit is second because money makes the world go around, so many people would do just about anything for it. A lot of people commit crimes and attacks to be recognized, they want people to know who they are and what they are capable of. Revenge is sometimes fueled by hatred and regret, where someone will want someone to undergo what they had to or worse. Politics is a nasty cycle of many types of crimes and many of these attacks are driven by other countries. Entertainment and Boredom go together in my opinion because people that have the ability to access information or perform attacks want to do something with those skills. 
  6. The first fake website I found claimed to sell a company’s merchandise at a cheaper price. On this company’s real website they claim to only sell their stuff on certain platforms. Another one I found was relatively new, but there were complaints that people who ordered stuff received counterfeit items. There was also not much information about the company and no way to get in contact with them. The last one that I found was a misrepresentation of the official company. It claimed to get people to perform tasks and to claim a gift card to use on the site. The real site would never promote a giveaway of such a large amount of money. The main difference between fake sites and real sites is the validity of the information provided. If there is some outrageous ask or offer that is a red flag indicator. 
  7. On the Social Media Disorder scale, I scored a 3. I think the questions on the scale could be a little more specific. I think differences are found across the world because of different accesses to social media. Different platforms are more popular in different areas, and social use in some areas is not common.  
  8. This article talks about social cybersecurity and how it is an emerging part of national security. It focuses on the ability to characterize, understand, and forecast cyber changes in human behavior, and social, cultural, and political outcomes. Traditional cybersecurity focuses more on technical measures to ensure the protection of systems. I think social cybersecurity is important to understand the reasons behind attack and also looks into human behavior to try to prevent them. 
  9. Cybersecurity analysts are the first responders to attacks. To do this they first have to manage risks. They have to study human behavior to see how vulnerable individuals are. They have to use tactics such as phishing, to find the information needed to implement measures and policies. 
  10.  I think the five most serious violations are sharing passwords, bullying and trolling, faking your identity, using other people’s internet networks, and collecting information about children. All of the violations are bad, but I think these are the most serious because they have a direct effect on other individuals. Sharing passwords and information can create a risk for unauthorized access to everything. Using other people’s networks can also open up vulnerabilities for people’s information
  11. Davin started off his field in accounting and fell into the digital forensics field. The company he worked for was looking for an IT person to help out, and he decided to give it a shot. As he continued to find an interest in IT, he found his way into a big accounting firm. He was able to work in the first national digital forensic practice. He started off on one profession and found a passion for another. He was able to learn new skills while also experiencing the advancement of technology. 

Leave a Reply

Your email address will not be published. Required fields are marked *