Journal #1
The NICE Workforce Framework for Cybersecurity describes different job roles and skills needed in the cybersecurity industry. I’m especially interested in “Threat Analysis” and “Cybersecurity Operations.” These roles focus on identifying and responding to cyber threats, which I find exciting and challenging. In “Threat Analysis,” you look for potential threats and try to understand how they might impact systems. “Cybersecurity Operations” involves managing and reacting to security issues in real-time to protect against attacks. Both of these areas appeal to me because they are dynamic and involve critical thinking. The “Security Architecture and Engineering” involves designing and building security systems. While this is important work, it’s less interesting to me because it focuses more on technical design and implementation. I prefer roles that are more about analyzing and reacting to threats rather than creating and maintaining security systems. Overall, the NICE Framework helps people choose career paths in cybersecurity based on what they are most interested in and good at. It’s useful for finding a role that matches your skills and passions in the cybersecurity field.
Journal #2
I think Science is very important for cybersecurity because it helps us understand and fix security problems. By using methods like data analysis and testing, scientists can develop strong codes to protect our information from being lost or stolen. For example, they use math to create encryption, which keeps data secure. They also analyze data to quickly spot and fix security issues. Overall though, science provides the tools and knowledge needed to improve and strengthen security measures, ensuring that our digital information stays safe. And that is something we really need nowadays especially since technology continues to excel and become better every year.
Journal #3
Researchers can use the information to understand data breaches better. They can look at the types of businesses that were affected, what kind of information was stolen, and how the breaches happened. This helps them see patterns and figure out what makes some companies more at risk. By studying the size and causes of the breaches, they can also learn how well businesses are protecting people’s data. The information can be used to improve security practices and suggest ways to prevent future breaches, helping keep personal information safer. Without this understanding and knowledge about breaches and some of the things that come with it, I think it would put us behind by a lot and our way of going about it.
Journal #4
Maslow’s Hierarchy of Needs connects to my use of technology in different ways. For basic needs, I use apps to order food or find a place to live. For safety, I rely on technology like security apps or online banking to protect my money and home. At ta normal level though, social media helps me stay in touch with friends and family. When it comes to esteem, I use technology to feel good about myself, like getting likes on posts or using LinkedIn to advance my career. Finally, for self-actualization, I use technology to learn new skills or explore my interests through online courses or creative apps. I think without technology it would change a lot of things about our daily lives and the things we do. It shapes some of who people are and also brings a lot of people together for the better,and even sometimes for the worse.
Journal #5
The most understandable reason for cybercrime is money because people often want to make money illegally. Political motives come next, as hackers may try to make a point or protest something they disagree with. Revenge is another reason, where people hack to get back at someone who hurt them. Some do it for recognition, seeking attention or trying to impress others. Multiple reasons can also be a motive, as people might hack for a mix of these reasons. Then Entertainment, as some people hack for fun, but the risks make this less reasonable. Finally, the least understandable reason is boredom committing cybercrime just because someone is bored doesn’t make much sense, given how serious the consequences are. So, money and politics are clearer reasons, while hacking for fun or boredom just makes less sense.
Journal #6
I think it’s easy to spot fake websites if you know what to look for in them. Fake sites usually have small changes in the web addresses. For example, a fake site might be pay-pal-login,com instead of the real one which is paypal.com
, or use a number like amaz0n-offers.net
instead of just amazon.com
. Another clue is when the address has extra words, like googlesecurity-support.org instead of just google.com There really just meant to fool people into thinking they are on the real site. The main signs to know its a fake website are misspelled URLs, strange endings, and the extra words in the name they always have. Even though there are a lot of signs though, its still very easy for a lot of people to get scammed and give away a lot of there cards and private information.
Journal #7
- Meme: This is a reminder that security applies to everyone, not just the professionals.
- An icon of someone using a computer for cybersecurity.
- Meme: The frustration of constantly trying to keep hackers out, but they keep coming.
- A group is having a meeting, discussing cybersecurity.
- Meme: Getting a surprise security update at the worst possible time!
- A man taking pictures of a woman in the snow preparing for an internship.
These memes and photos show that cybersecurity is not just about technology, it’s deeper and about how people feel and react to staying safe online and having the best security they can.
Journal #8
After watching the video, I realized that movies and TV shows don’t really understand hackers. They make hacking look very easy and super exciting, showing hackers as heroes or villains who can break into systems in just a few seconds. This definely gives people the wrong idea about what real hacking is like. In the real world, hacking requires a lot of knowledge, patience, and hard work. The way social media portrays hacking can make people underestimate the seriousness of cybercrime and the need for good cybersecurity. Overall, the media influences how we see hackers and cybersecurity, often looking more on the entertainment in it than on what is actually true.
Journal #9
Journal #10
The article “Social Cybersecurity” talks about how enemies use online platforms and human behavior to spread lies, create mistrust, and manipulate people. This type of cyberattack focuses on social interactions, not just computer systems. To protect against these threats, the military and other organizations need to teach people how to spot fake information and how to keep trust strong in their communities. This helps make society stronger against cyberattacks that target human weaknesses. Overall though I think I learned a lot of new things I never knew about. But I think its great that we are finding better ways to stop certain things like these from happening.
Journal #11
Cybersecurity analysts protect computer systems from cyber threats by identifying risks and preventing attacks. They need technical skills such as understanding networks, security tools, and data encryption. A degree in computer science or cybersecurity is usually required, along with certifications like CISSP. Strong problem solving and communication skills are also important, as analysts work with teams to improve security. The average salary for this role in the U.S. is about $75,000 to $90,000 annually, with higher earnings possible for those with more experience or special certifications. I also think a good way to take cybersecurity is through the military,Not even just for the benefits.
Journal #12
The Sample Data Breach Notification letter connects to economics and social science in simple ways. First, the company must decide if the cost of fixing the problem and protecting data in the future is worth it. Also, managing financial risks is crucial to prevent future issues. Social science theories show that rebuilding trust is key, so the company explains the problem clearly to ease customer worries. This mix of financial and trust-based actions helps repair the company’s image and relationships with customers.I think this was a very interesting topic and I definitely want to learn more.
Journal #13
The article explains how bug bounty programs help companies find security problems by paying ethical hackers to look for them. These hackers find issues that, if left unnoticed, could lead to expensive cyberattacks. Research shows that these programs are helpful because they encourage skilled hackers to protect companies in exchange for rewards. However, there can be challenges, like managing too many reports and making sure they’re high quality. Overall, bug bounties are a smart way to improve security, but they need careful planning to work well. But i think this was a really smart idea and thing to do to stop these problems from happening.
Journal #14
Andriy Slynchuk talked about a lot things people do online that are really illegal and harmful. One big one is pirating software and media, which means downloading or sharing movies, music, or programs without paying. This takes a lot of money away from the people who created them. Another serious crime is hacking and identity theft, where someone steals personal information like credit card numbers, causing financial problems and breaking privacy. Child exploitation is even worse, its basically sharing harmful content about children which hurts them. Cyberbullying and harassment is also a big issue, where people hurt others emotionally online, sometimes causing them serious harm. And last but not least, fraud and scams is tricking people into losing money or buying fake products, which of course makes the internet less trustworthy. These are serious because they hurt people, cause damage, and can lead to problems that will never go away.
Journal #15
Davin Teo talked about his job in digital forensics, where he solves crimes involving technology, like hacking or online fraud. He explained that it’s not just about computers, it’s also about understanding people. Investigators need to figure out why someone committed a crime and how they think, which connects to subjects like psychology and sociology. What I found interesting was how Davin’s career started in accounting, but he switched to digital forensics because it excited him. His story shows that it’s okay to change paths if you find something you enjoy more.I also liked how Davin said his work helps people and makes the world safer. It reminded me that even jobs with technology can have a human side and make a real difference.