CYSE 201 S
William Albert
2025/01/22
Threat Analysis
The career that’s interesting for me is Threat Analysis, because Threat Analysis is a job
that can help businesses to have a better and secure way to transfer data and the
responsibility for collecting, processing, analyzing, and disseminating cybersecurity
threat assessments. The Areas that would appeal the most for me is the understanding
of Malware and how it works. And the least area that would appeal to me would be the
Laws and regulations because there are a lot of regulations when it is using technology
and the laws and what to not do which is useful but also a lot of knowledge to know.
And that is why Threat Analysis is a good career.
CYSE201S
William Albert
2025/01/28
Journal Entry 2
Science in Cybersecurity helps in useful strategies. Empiricism is really important on the
real world data, such as penetration tests, to identify threats. Determinism helps to find
any type of specific vulnerabilities or attacks which enable proactive defense.
Parsimony helps to advocate for simple, effective solutions, avoiding unnecessary
complexity in security measures.The Object helps to ensure decisions that are based on
facts and evidence which are not biased which is crucial for threat analysis.
Replicability helps to ensure security measures work consistently across different
systems, making solutions reliable. Those principles help in cybersecurity professions
that create efficient, evidence based, and objective defense strategies to mitigate risks
and enhance security. And that is why Science is important for cybersecurity.
William Albert
CYSE201S
2025/02/05
Data Breaches
The information from the Privacy rights shows a lot of information about how our data can get leaked and how we can prevent them. An example would be the spams, which in the article shows how to prevent those spams and how to take them if there are any and it would tell you details on how some of your data can get leaked which gives the reason of why people would get spams from their mail. Using this website is really useful on finding problems that you have trouble with in your computer or just by reading it you would know more about data breaches.
2025/02/13
CYSE 201S
William Albert
Maslow’s Hierarchy of Needs
In Maslow’s hierarchy of needs, there are 5 parts for better security. The 1st one is physiological needs like food, water, warmth or rest. The 2nd one is safety, for example security or safety. The 3rd one is the belongingness and love needs which consist of intimate relationships and friends. The 4th one is the esteem needs is prestige and feeling of accomplishment and the last one is the self actualization which is achieving pens full potential including creative activities. When you use those needs. It helps more with security.
2025/02/18
CYSE 201S
William Albert
Rank motives
1.What Drives Hackers to a Life of Cybercrime?
2.Cyberbullying and online sexual grooming of children ‘on the increase’
3.Revenge porn victims in Wales often feel ‘let down by the law’ as cybercrime slips through the net
4.New generation of angry & youthful hackers join the ‘hacktivism’ wave, adding to cyber-security woe
5.Sex, Drugs and Toilet Rolls: How Cybercriminals Spend Their Money (infographic)
6.Man behind LinkedIn scraping said he grabbed 700M profiles ‘for fun’
7.8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019 UK general election
The 1st one is What drives Hackers to a life of cybercrime because it explains us of why hackers do things like this in the world and why they become one? the result is that most of them do it for the money but most of them do it because they want to. The last one of the motive is the 8 month suspended sentence for script kiddie who DDoS’d Labour candidate in run up to 2019 UK general election because it basically talks about a hacker who DDoS’d a Labour candidate and saw the accounts that people where on when the election happened.
2025/02/26
William Albert
CYSE 201S
Fake PayPal Website
• Legitimate Website: “https://www.paypal.com”
• Fraudulent Website: “https://www.paypa1.com”
Counterfeit Apple Retailer
• Legitimate Website: “https://www.apple.com”
• Fraudulent Website: “https://www.applestore.com”
Fake Netflix Login Page
• Legitimate Website: “https://www.netflix.com”
• Fraudulent Website: “https://www.netf1ix.com”
These are some examples of how websites can be the same but also a way for you to lose accounts like this which is why you should always check before signing in any login page or check if the website official and look for anything thats suspicious about it like the name and what content does it have.
2025/03/19
William Albert
CYSE 201S
This Video talks about a women who is specialized in cybersecurity which she saw 12 scenes of movies that related hacking and critics them to see if they are realistic or not. She looked at movies scenes like like Mr. Robot, Skyfall, and The Matrix and she would argue that a lot of scenes in movies when they were hacking, they weren’t at all realistic when it came to hacking and that they did most of the hacking scenes wrong like the scene in s3 of mr. robot where he was in a CTF and most of the hacks they did where wrong and used the wrong hacking tools to do what they were supposed to do which makes you think that most of movies when it comes to hacking are not realistic and that they should fix this issue for the sake of all people who work on technology.
2025/04/01
William Albert
CYSE 201S
Journal entry 10: “Social Cybersecurity” An Emerging National Security Imperative” by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley shows the importance of integrating social dynamics into national cybersecurity policy. The authors argue that traditional cybersecurity is focused on technical vulnerabilities without consideration for the role of social systems, human activity, and online networks. So, cyber threats are becoming quite sophisticated these days, and the authors note that it’s really important to understand how social interaction, influence, and information sharing factor into cybersecurity. They’re advocating for a larger-scale approach, saying that we need to address social cybersecurity as if it’s a matter of national security. It requires both technical expertise and social intelligence to protect our critical infrastructure and counter adversaries who employ social manipulation tactics online.
2025/04/01
William Albert
CYSE 201S
Journal entry 11: The video “What Does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook” explains the role of a cybersecurity analyst whose job is to safeguard an organization’s computer systems, networks, and sensitive information from cyber threats. The main responsibilities are to watch for intrusions in security, analyze incidents, keep the security software updated, and create security best practices. The video also highlights that competitive wages are offered to cybersecurity analysts, with a mean wage of approximately $103,590 annually as of 2023. The outlook for the profession is favorable, and employment is expected to grow by 33% from 2023 to 2033 due to heightened incidences of cyber attacks. Skills needed for the profession are proficiency in computer networks, security software, and analytical capability. The video recognizes the increased need for cybersecurity analysts as companies invest in digital security.
2025/04/09
William Albert
CYSE 201S
Contained in both psychology and economics are several vital concepts associated with the data breach notice. There is in psychology prospect theory. This hypothesis clarifies why breaches really upset people. Losses like stolen personal data usually seem much worse than any gains, such free credit monitoring, would seem. Cognitive dissonance theory, whereby customers who once trusted the business now feel perplexed and uneasy due of the breach, is one more idea. This course of events can cause one to act differently to feel more at ease, hence losing trust. Economically, there is something identified as information asymmetry. Secondly, this made it challenging for the clients because the firm first knew more about the breach than they did. The notice tries to provide consumers the knowledge they need to solve this. One may also consider cost-better regulation with reference to_VALIDATE. Telling people about the breach and supporting them might be less expensive for the company than legal issues or a bad reputation. Customers also consider if they should follow additional steps to protect their data.
references:
https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site.
2025/04/10
William Albert
CYSE 201S
The piece examines how companies can use bug bounty plans to improve cyber security by asking outside specialists to identify and report bugs. Although cash is a motivating factor, several people are driven by knowledge, recognition, and contribution to stability, according to the literature. The results emphasize that these initiatives are most successful when they have honest standards and clear direction. Security is enhanced but managing is key to dealing with reports and avoiding legal or operational challenges. A clever, cooperative approach to improve security is bug bounty policies. Well-organized, these leverages worldwide talent and provide value greater than that available from internal teams.
references: https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true
2025/04/26
William Albert
CYSE 201S
After watching Davin Teo’s TEDx talk, I was so struck by how personal and relatable his professional trajectory into digital forensics was. He did not just talk about technology or crime—he spoke about human beings, and that made it accessible. What spoke to me the most was how he connected his work to the pursuit of understanding human behavior. He discussed how every digital trail tells a story, and to crack a case, you must get into the mind of the individual at the other side of the screen. That link to psychology and the social sciences opened my eyes to digital forensics in a new way—not merely data work, but as a means of uncovering motives, decisions, and outcomes. His passion was so clear, and it provided an opportunity to think about how careers can emerge from curiosity and an effort to decipher the world. It made a tech career feel more human, more purposeful.