Journal Entries

The NICE Workforce Framework provides a comprehensive guide for cybersecurity professionals to define their career paths and develop their skills. Data forensics professionals can find relevant categories, specialty areas, and work roles in the “Investigate” and “Protect and Defend” categories, while areas related to “Securely Provision,” “Operate and Maintain,” and “Oversee and Govern” may be less appealing to them.

• Review the NICE Workforce Framework. Are there certain areas that you

would want to focus your career on? Explain which areas would appeal

the most to you and which would appeal the least.

Workforce Framework for Cybersecurity (NICE Framework) | NICCS

(cisa.gov)

CYSE201S 28

The principles of science, such as the scientific method and empirical evidence, are critical in the field of cybersecurity. Cybersecurity professionals use scientific principles to identify and analyze potential threats, develop hypotheses about how attacks might occur, and then test those hypotheses using data-driven techniques. Through this process, they can develop effective strategies for protecting systems and data, as well as identify and respond to security breaches. Additionally, the constant evolution of cybersecurity threats and the need for ongoing analysis and experimentation make scientific principles essential in the field of cybersecurity.

Explain how the principles of science relate to cybersecurity

CYSE201S 16

The data on PrivacyRights.org can be used by researchers in a variety of ways to examine data breaches. They can use the data, for instance, to spot trends in the types of businesses that suffer breaches, the reasons behind them, the kinds of data that are compromised, and the effects of such breaches on people and organizations. This data can be used by researchers to create models that forecast the likelihood and consequences of future breaches. Researchers can better grasp the dynamic nature of cyber threats and create more efficient preventative and remedial tactics by tracking patterns over time. The data can also be utilized to inform legislation and public policy about data security and privacy.

Visit PrivacyRights.org to see the types of publicly available information

about data breaches. How might researchers use this information to

study breaches? Enter a paragraph in your journal.

CYSE201S 13

Maslow’s Hierarchy of Needs explains how human needs are prioritized and satisfied, from the most fundamental physiological requirements to self-actualization. Every degree of need has been satisfied in my experiences with technology in different ways. Utilizing sleep-tracking gadgets and getting information about where to find food and water are just two examples of how technology has aided in meeting fundamental survival needs. Through the protection of digital assets and the facilitation of social relationships via social media and messaging apps, it has offered a sense of security. Through professional networking sites, technology has made it possible to be recognized for accomplishments, and it has opened doors for personal development through online learning environments and communities. While there is no denying that technology has advantages, it is crucial to use it carefully and purposefully to improve our lives.

Review Maslow’s Hierarchy of Needs and explain how each level

relates to your experiences with technology. Give specific examples of

how your digital experiences relate to each level of need.

CYSE201S 22

Multiple reasons

For Money

Entertainment

Recognition

Revenge

Boredom

Political

Multiple reasons makes sense as the most because when you see a specific type of attack their is multiple reasons why someone may attack a network. For money makes the most sense in America because most data that is taken is sold anyways. People hack for entertainment because they enjoy the challenge and thrill of breaking into systems and networks.People hack for recognition because they seek fame, prestige, and validation from their peers and the wider community of hackers.People hack for revenge because they feel wronged or betrayed and want to inflict harm or damage on the person or organization they believe is responsible.People hack for boredom because they are looking for a way to pass the time and find hacking to be a challenging and engaging activity. People hack for political reasons because they want to spread a certain agenda.

Review the articles linked with each individual motive. Rank the

motives from 1 to 7 as the motives that you think make the most sense

(being 1) to the least sense (being 7). Explain why you rank each

motive the way you rank it.

CYSE201S 4

Psychological theories including the rational choice theory, social learning theory, self-control theory, and anonymity theory can shed light on the psychological mechanisms and underlying reasons that lead people to commit cybercrimes. Psychological concepts like resilience, trauma-informed care, and coping techniques can help cybervictims recover from the emotional and psychological effects of being victimized online. Designing effective cybersecurity methods and treatments that are more likely to be accepted and used successfully by people and organizations requires the integration of risk management, user-centered design, and behavioral psychology principles.

• Describe the psychological theories that explain cyber offending

• Apply psychological principles to cyber victims and cybersecurity

professionals

CYSE201S 2

Individual Motives

Individual Motive depends on individuals and crimes. A link to an example of each motive

is included:

• Entertainment

• Political https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers

-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms

• Revenge https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-

cybercrime-slips-through-the-net/

• Boredom https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children

-on-the-increase/

• Recognition https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/

• For money https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-

money-infographic/

• Multiple reasons https://www.infosecurity-magazine.com/news/what-drives-hackers-to-a-life-

of/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-

gqNtZGzNAfijcnBszQi6

Poor design and layout: Fake websites often have a poorly designed website layout, with low-quality images and an unprofessional look and feel. Professional design and layout: Real websites generally have a professional and well-designed layout, with high-quality images and a polished look and feel. Consistent domain names: Real websites use domain names that are consistent with their brand and are easily recognizable to users.

Can you spot three fake websites and compare the three fake websites

to three real websites, plus showcase what makes the fake websites

fake?

CYSE201S 22

This meme shows how the human operator cannot go into the kernel and discover rootkits manually. It shows how beneficial a device would be that automatically detects rootkits remotely from any network.

 Review the following ten photos through a cybersecurity human systems integration framework.

Create a meme explaining what is going on in the individual’s or individuals’ mind(s).

• https://unsplash.com/photos/mfB1B1s4sMc

• https://unsplash.com/photos/gySMaocSdqs

• https://unsplash.com/photos/ICTKcvnXx_8

• https://unsplash.com/photos/Z3ownETsdNQ

• https://unsplash.com/photos/5QgIuuBxKwM

• https://unsplash.com/photos/R6dSBkz32B8

• https://unsplash.com/photos/BXiLSwwvqrY

• https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg

• https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg

• https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg

• Explain how your memes relate to Human Systems Integration.

The media has a significant influence on our understanding of cybersecurity by shaping the way we perceive the issue and framing the conversation around it. It is essential to critically evaluate media coverage of cybersecurity and seek out a range of perspectives to develop a well-rounded understanding of the issue.

• Watch this video and pay attention to the way that movies distort

hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How

Real Is It? – YouTube

• After watching the video, write a journal entry about how you think

the media influences our understanding about cybersecurity

CYSE201S 27

On the social media scale i scored a moderate addiction score. I think that the items were interesting and made me really think on my use of social media and how it effects my mental health. I think that different patterns across the world is because different cultures have different social hierarchies.

Complete the Social Media Disorder scale. How did you score? What

do you think about the items in the scale? Why do you think that

different patterns are found across the world?

CYSE201S 34

Social cybersecurity is critical for the military in protecting national security and combating cyber threats. Leaders must enact policies that enable freedom of maneuver in the relevant information environments, while also protecting the privacy of individuals and remaining within the authorities granted to the DOD.

Read this and write a journal entry summarizing your response to the

article on social cybersecurity

https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-

Archives/Mar-Apr-2019/117-Cybersecurity/b/

CYSE201S 6

The theory of information asymmetry and the theory of externalities are two different economic theories that have something to do with data breaches. According to the notion of information asymmetry, when information is not distributed evenly among the parties, the party with more information may take advantage of the other party. When there are data breaches, there is an imbalance of power since hackers have access to private information that the victim is unaware of. According to this notion, legislation and guidelines may be required to hold businesses and organizations responsible for safeguarding user data. According to the principle of externalities, data breaches have detrimental external repercussions on society and people in addition to the victim organization. The social control theory suggests that individuals are motivated to engage in lawful behavior because of the social constraints that exist in society. In the context of data breaches, this theory suggests that companies and organizations have a responsibility to maintain a social norm of protecting user data, which can help to deter hackers from engaging in illegal activities. This theory suggests that there may be a need for effective law enforcement and criminal justice policies to deter hackers from engaging in these activities.

Read this https://dojmt.gov/wp-

content/uploads/Glasswasherparts.com_.pdf sample breach letter

“SAMPLE DATA BREACH NOTIFICATION” and describe how two

different economics theories and two different social sciences

theories relate to the letter.

CYSE201S

Andriy Slynchuk’s article outlines eleven potentially illegal activities that Internet users may engage in. The five most serious offenses mentioned in the article include hacking into government or corporate networks, engaging in child pornography, using the Internet for terrorist activities, committing online fraud or identity theft, and participating in cyberbullying. These are serious violations that can have severe consequences for both the perpetrator and the victim. They can lead to financial loss, personal harm, and damage to reputation or national security. It is important for Internet users to be aware of these offenses and to act responsibly online, in order to maintain a safe and secure digital environment for all.

• Andriy Slynchuk has described

eleven things Internet users do

that may be illegal. Review what

the author says and write a

paragraph describing the five

most serious violations and why

you think those offenses are

serious.

CYSE201S 7

https://clario.co/blog/illegal-things-you-do-online/

Because it requires working closely with other experts in the criminal justice system and comprehending the social and behavioral components of cybercrime, the career of digital forensics investigators is intimately tied to the social sciences. Investigators must be able to explain technical knowledge to non-technical audiences and possess a solid understanding of social and behavioral concepts in order to be successful in this line of work.

his video and think about how the career of digital forensics

investigators relate to the social sciences. Write a journal entry

describing what you think about the speaker’s pathway to his career.

CYSE201S 28