{"id":71,"date":"2023-01-23T03:55:15","date_gmt":"2023-01-23T03:55:15","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=71"},"modified":"2023-04-25T03:17:12","modified_gmt":"2023-04-25T03:17:12","slug":"significant-projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/significant-projects\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>The NICE Workforce Framework provides a comprehensive guide for cybersecurity professionals to define their career paths and develop their skills. Data forensics professionals can find relevant categories, specialty areas, and work roles in the &#8220;Investigate&#8221; and &#8220;Protect and Defend&#8221; categories, while areas related to &#8220;Securely Provision,&#8221; &#8220;Operate and Maintain,&#8221; and &#8220;Oversee and Govern&#8221; may be less appealing to them.<\/p>\n\n\n\n<p>\u2022 Review the NICE Workforce Framework. Are there certain areas that you<\/p>\n\n\n\n<p>would want to focus your career on? Explain which areas would appeal<\/p>\n\n\n\n<p>the most to you and which would appeal the least.<\/p>\n\n\n\n<p>Workforce Framework for Cybersecurity (NICE Framework) | NICCS<\/p>\n\n\n\n<p>(cisa.gov)<\/p>\n\n\n\n<p>CYSE201S 28<\/p>\n\n\n\n<p>The principles of science, such as the scientific method and empirical evidence, are critical in the field of cybersecurity. Cybersecurity professionals use scientific principles to identify and analyze potential threats, develop hypotheses about how attacks might occur, and then test those hypotheses using data-driven techniques. Through this process, they can develop effective strategies for protecting systems and data, as well as identify and respond to security breaches. Additionally, the constant evolution of cybersecurity threats and the need for ongoing analysis and experimentation make scientific principles essential in the field of cybersecurity.<\/p>\n\n\n\n<p>Explain how the principles of science relate to cybersecurity<\/p>\n\n\n\n<p>CYSE201S 16<\/p>\n\n\n\n<p>The data on PrivacyRights.org can be used by researchers in a variety of ways to examine data breaches. They can use the data, for instance, to spot trends in the types of businesses that suffer breaches, the reasons behind them, the kinds of data that are compromised, and the effects of such breaches on people and organizations. This data can be used by researchers to create models that forecast the likelihood and consequences of future breaches. Researchers can better grasp the dynamic nature of cyber threats and create more efficient preventative and remedial tactics by tracking patterns over time. The data can also be utilized to inform legislation and public policy about data security and privacy.<\/p>\n\n\n\n<p>Visit PrivacyRights.org to see the types of publicly available information<\/p>\n\n\n\n<p>about data breaches. How might researchers use this information to<\/p>\n\n\n\n<p>study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<p>CYSE201S 13<\/p>\n\n\n\n<p>Maslow&#8217;s Hierarchy of Needs explains how human needs are prioritized and satisfied, from the most fundamental physiological requirements to self-actualization. Every degree of need has been satisfied in my experiences with technology in different ways. Utilizing sleep-tracking gadgets and getting information about where to find food and water are just two examples of how technology has aided in meeting fundamental survival needs. Through the protection of digital assets and the facilitation of social relationships via social media and messaging apps, it has offered a sense of security. Through professional networking sites, technology has made it possible to be recognized for accomplishments, and it has opened doors for personal development through online learning environments and communities. While there is no denying that technology has advantages, it is crucial to use it carefully and purposefully to improve our lives.<\/p>\n\n\n\n<p>Review Maslow\u2019s Hierarchy of Needs and explain how each level<\/p>\n\n\n\n<p>relates to your experiences with technology. Give specific examples of<\/p>\n\n\n\n<p>how your digital experiences relate to each level of need.<\/p>\n\n\n\n<p>CYSE201S 22<\/p>\n\n\n\n<p>Multiple reasons<\/p>\n\n\n\n<p>For Money<\/p>\n\n\n\n<p>Entertainment<\/p>\n\n\n\n<p>Recognition<\/p>\n\n\n\n<p>Revenge<\/p>\n\n\n\n<p>Boredom<\/p>\n\n\n\n<p>Political<\/p>\n\n\n\n<p>Multiple reasons makes sense as the most because when you see a specific type of attack their is multiple reasons why someone may attack a network. For money makes the most sense in America because most data that is taken is sold anyways. People hack for entertainment because they enjoy the challenge and thrill of breaking into systems and networks.People hack for recognition because they seek fame, prestige, and validation from their peers and the wider community of hackers.People hack for revenge because they feel wronged or betrayed and want to inflict harm or damage on the person or organization they believe is responsible.People hack for boredom because they are looking for a way to pass the time and find hacking to be a challenging and engaging activity. People hack for political reasons because they want to spread a certain agenda.<\/p>\n\n\n\n<p>Review the articles linked with each individual motive. Rank the<\/p>\n\n\n\n<p>motives from 1 to 7 as the motives that you think make the most sense<\/p>\n\n\n\n<p>(being 1) to the least sense (being 7). Explain why you rank each<\/p>\n\n\n\n<p>motive the way you rank it.<\/p>\n\n\n\n<p>CYSE201S 4<\/p>\n\n\n\n<p>Psychological theories including the rational choice theory, social learning theory, self-control theory, and anonymity theory can shed light on the psychological mechanisms and underlying reasons that lead people to commit cybercrimes. Psychological concepts like resilience, trauma-informed care, and coping techniques can help cybervictims recover from the emotional and psychological effects of being victimized online. Designing effective cybersecurity methods and treatments that are more likely to be accepted and used successfully by people and organizations requires the integration of risk management, user-centered design, and behavioral psychology principles.<\/p>\n\n\n\n<p>\u2022 Describe the psychological theories that explain cyber offending<\/p>\n\n\n\n<p>\u2022 Apply psychological principles to cyber victims and cybersecurity<\/p>\n\n\n\n<p>professionals<\/p>\n\n\n\n<p>CYSE201S 2<\/p>\n\n\n\n<p>Individual Motives<\/p>\n\n\n\n<p>Individual Motive depends on individuals and crimes. A link to an example of each motive<\/p>\n\n\n\n<p>is included:<\/p>\n\n\n\n<p>\u2022 Entertainment<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-9-to-5-mac wp-block-embed-9-to-5-mac\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"uvGGGuqZpp\"><a href=\"https:\/\/9to5mac.com\/2021\/07\/19\/man-behind-linkedin-scraping\/\">Man behind LinkedIn scraping said he grabbed 700M profiles &#8216;for fun&#8217;<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Man behind LinkedIn scraping said he grabbed 700M profiles &#8216;for fun&#8217;&#8221; &#8212; 9to5Mac\" src=\"https:\/\/9to5mac.com\/2021\/07\/19\/man-behind-linkedin-scraping\/embed\/#?secret=GMHUXqwLvr#?secret=uvGGGuqZpp\" data-secret=\"uvGGGuqZpp\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>\u2022 Political https:\/\/economictimes.indiatimes.com\/magazines\/panache\/new-generation-of-angry-youthful-hackers<\/p>\n\n\n\n<p>-join-the-hacktivism-wave-adding-to-cyber-security-woes\/articleshow\/81707844.cms<\/p>\n\n\n\n<p>\u2022 Revenge https:\/\/newsfromwales.co.uk\/news\/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-<\/p>\n\n\n\n<p>cybercrime-slips-through-the-net\/<\/p>\n\n\n\n<p>\u2022 Boredom https:\/\/www.heraldlive.co.za\/news\/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children<\/p>\n\n\n\n<p>-on-the-increase\/<\/p>\n\n\n\n<p>\u2022 Recognition https:\/\/www.theregister.com\/2021\/06\/30\/bradley_niblock_election_ddos\/<\/p>\n\n\n\n<p>\u2022 For money https:\/\/threatresearch.ext.hp.com\/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-<\/p>\n\n\n\n<p>money-infographic\/<\/p>\n\n\n\n<p>\u2022 Multiple reasons https:\/\/www.infosecurity-magazine.com\/news\/what-drives-hackers-to-a-life-<\/p>\n\n\n\n<p>of\/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-<\/p>\n\n\n\n<p>gqNtZGzNAfijcnBszQi6<\/p>\n\n\n\n<p>Poor design and layout: Fake websites often have a poorly designed website layout, with low-quality images and an unprofessional look and feel. Professional design and layout: Real websites generally have a professional and well-designed layout, with high-quality images and a polished look and feel. Consistent domain names: Real websites use domain names that are consistent with their brand and are easily recognizable to users.<\/p>\n\n\n\n<p>Can you spot three fake websites and compare the three fake websites<\/p>\n\n\n\n<p>to three real websites, plus showcase what makes the fake websites<\/p>\n\n\n\n<p>fake?<\/p>\n\n\n\n<p>CYSE201S 22<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"773\" src=\"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image-1024x773.png\" alt=\"\" class=\"wp-image-245\" srcset=\"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image-1024x773.png 1024w, https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image-300x226.png 300w, https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image-768x580.png 768w, https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image-398x300.png 398w, https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-content\/uploads\/sites\/32218\/2023\/04\/image.png 1170w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>This meme shows how the human operator cannot go into the kernel and discover rootkits manually. It shows how beneficial a device would be that automatically detects rootkits remotely from any network.<\/p>\n\n\n\n<p>&nbsp;Review the following ten photos through a cybersecurity human systems integration framework.<\/p>\n\n\n\n<p>Create a meme explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/mfB1B1s4sMc<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/gySMaocSdqs<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/ICTKcvnXx_8<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/Z3ownETsdNQ<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/5QgIuuBxKwM<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/R6dSBkz32B8<\/p>\n\n\n\n<p>\u2022 https:\/\/unsplash.com\/photos\/BXiLSwwvqrY<\/p>\n\n\n\n<p>\u2022 https:\/\/commons.wikimedia.org\/wiki\/File:Computer_user_icon.svg<\/p>\n\n\n\n<p>\u2022 https:\/\/commons.wikimedia.org\/wiki\/File:Summer_school_GLAM_giorno_1_1.jpg<\/p>\n\n\n\n<p>\u2022 https:\/\/commons.wikimedia.org\/wiki\/File:CellPhone_(16491636068).jpg<\/p>\n\n\n\n<p>\u2022 Explain how your memes relate to Human Systems Integration.<\/p>\n\n\n\n<p>The media has a significant influence on our understanding of cybersecurity by shaping the way we perceive the issue and framing the conversation around it. It is essential to critically evaluate media coverage of cybersecurity and seek out a range of perspectives to develop a well-rounded understanding of the issue.<\/p>\n\n\n\n<p>\u2022 Watch this video and pay attention to the way that movies distort<\/p>\n\n\n\n<p>hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How<\/p>\n\n\n\n<p>Real Is It? &#8211; YouTube<\/p>\n\n\n\n<p>\u2022 After watching the video, write a journal entry about how you think<\/p>\n\n\n\n<p>the media influences our understanding about cybersecurity<\/p>\n\n\n\n<p>CYSE201S 27<\/p>\n\n\n\n<p>On the social media scale i scored a moderate addiction score. I think that the items were interesting and made me really think on my use of social media and how it effects my mental health. I think that different patterns across the world is because different cultures have different social hierarchies.<\/p>\n\n\n\n<p>Complete the Social Media Disorder scale. How did you score? What<\/p>\n\n\n\n<p>do you think about the items in the scale? Why do you think that<\/p>\n\n\n\n<p>different patterns are found across the world?<\/p>\n\n\n\n<p>CYSE201S 34<\/p>\n\n\n\n<p>Social cybersecurity is critical for the military in protecting national security and combating cyber threats. Leaders must enact policies that enable freedom of maneuver in the relevant information environments, while also protecting the privacy of individuals and remaining within the authorities granted to the DOD.<\/p>\n\n\n\n<p>Read this and write a journal entry summarizing your response to the<\/p>\n\n\n\n<p>article on social cybersecurity<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-\n<\/div><\/figure>\n\n\n\n<p>Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/<\/p>\n\n\n\n<p>CYSE201S 6<\/p>\n\n\n\n<p>The theory of information asymmetry and the theory of externalities are two different economic theories that have something to do with data breaches. According to the notion of information asymmetry, when information is not distributed evenly among the parties, the party with more information may take advantage of the other party. When there are data breaches, there is an imbalance of power since hackers have access to private information that the victim is unaware of. According to this notion, legislation and guidelines may be required to hold businesses and organizations responsible for safeguarding user data. According to the principle of externalities, data breaches have detrimental external repercussions on society and people in addition to the victim organization. The social control theory suggests that individuals are motivated to engage in lawful behavior because of the social constraints that exist in society. In the context of data breaches, this theory suggests that companies and organizations have a responsibility to maintain a social norm of protecting user data, which can help to deter hackers from engaging in illegal activities. This theory suggests that there may be a need for effective law enforcement and criminal justice policies to deter hackers from engaging in these activities.<\/p>\n\n\n\n<p>Read this https:\/\/dojmt.gov\/wp-<\/p>\n\n\n\n<p>content\/uploads\/Glasswasherparts.com_.pdf sample breach letter<\/p>\n\n\n\n<p>\u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two<\/p>\n\n\n\n<p>different economics theories and two different social sciences<\/p>\n\n\n\n<p>theories relate to the letter.<\/p>\n\n\n\n<p>CYSE201S<\/p>\n\n\n\n<p>Andriy Slynchuk&#8217;s article outlines eleven potentially illegal activities that Internet users may engage in. The five most serious offenses mentioned in the article include hacking into government or corporate networks, engaging in child pornography, using the Internet for terrorist activities, committing online fraud or identity theft, and participating in cyberbullying. These are serious violations that can have severe consequences for both the perpetrator and the victim. They can lead to financial loss, personal harm, and damage to reputation or national security. It is important for Internet users to be aware of these offenses and to act responsibly online, in order to maintain a safe and secure digital environment for all.<\/p>\n\n\n\n<p>\u2022 Andriy Slynchuk has described<\/p>\n\n\n\n<p>eleven things Internet users do<\/p>\n\n\n\n<p>that may be illegal. Review what<\/p>\n\n\n\n<p>the author says and write a<\/p>\n\n\n\n<p>paragraph describing the five<\/p>\n\n\n\n<p>most serious violations and why<\/p>\n\n\n\n<p>you think those offenses are<\/p>\n\n\n\n<p>serious.<\/p>\n\n\n\n<p>CYSE201S 7<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/clario.co\/blog\/illegal-things-you-do-online\/\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Digital Forensics | Davin Teo | TEDxHongKongSalon\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/Pf-JnQfAEew?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Because it requires working closely with other experts in the criminal justice system and comprehending the social and behavioral components of cybercrime, the career of digital forensics investigators is intimately tied to the social sciences. Investigators must be able to explain technical knowledge to non-technical audiences and possess a solid understanding of social and behavioral concepts in order to be successful in this line of work.<\/p>\n\n\n\n<p>his video and think about how the career of digital forensics<\/p>\n\n\n\n<p>investigators relate to the social sciences. Write a journal entry<\/p>\n\n\n\n<p>describing what you think about the speaker\u2019s pathway to his career.<\/p>\n\n\n\n<p>CYSE201S 28<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NICE Workforce Framework provides a comprehensive guide for cybersecurity professionals to define their career paths and develop their skills. Data forensics professionals can find relevant categories, specialty areas, and work roles in the &#8220;Investigate&#8221; and &#8220;Protect and Defend&#8221; categories, while areas related to &#8220;Securely Provision,&#8221; &#8220;Operate and Maintain,&#8221; and &#8220;Oversee and Govern&#8221; may be&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber201jjw\/significant-projects\/\">Read More<\/a><\/div>\n","protected":false},"author":23394,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/pages\/71"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/users\/23394"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":246,"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/pages\/71\/revisions\/246"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201jjw\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}