Journal Entry #1

All the fields of cybersecurity in the workforce framework look very interesting to me. But the analysis field stood out to me the most. This is an area I would want to focus my career in. I say this because I’m very good at analyzing data and have elite critical thinking skills. I can intake and analyze data with amazing precision. I would love this field because I’m very alert about online schemes. So, once I learn more about cybersecurity, I’m going to be a master at hand. A field that I find the least amount of interest in is the oversee and govern. I say this because this field requires management and leadership skills. I lack significantly in this area; I don’t like watching over people and telling them what to do. I like to stay in my bubble and not control others. It seems like a cool field but it’s not for me. 

Journal Entry 2

Cybersecurity is a field in the computer science industry. This field requires good math and analytical skills. The principles of science relate to cybersecurity because empiricism, objectivity, parsimony, ethical neutrality, and determinism are all needed principles in the cybersecurity field. These principles study the behavior of science. These principles can help explain why certain actions occur in cybersecurity. Cybersecurity is a very complex field. You must gather information and make good scientific observations. Cybersecurity deals with a variety of multiplex networks and systems of information. The science in cybersecurity involves analyzing big amounts of data and using it to defense attacks.

Journal entry 3

This website talks about data breach reports from 2005-2021. There were 20,161 reported data breaches in the United States during this time. But there were 2,048,320,547 impacted records. There are many types of data breaches. The hack breach is the most popular type. According to the website, 49 percent of the data brokers registered in 2021 were marketing businesses. Researchers can use this information to study different types of breaches. They can also see what types of breaches are most common in certain areas. Researchers can also see which organization has the largest reported breach notifications. Researchers can use this website to study data breaches in all categories displayed.

Journal entry 4

Maslow’s Hierarchy of Needs suggests that when our low-level needs are met, we begin to focus on meeting our upper-level needs. Now that you have a breakdown of the subject at hand, I will relate each level to my experiences with technology. Self-actualization is when you achieve your full potential at something. I can relate this to technology because I fully understand how to work my iMac. At first, I was kind of lost and I didn’t understand all the commands. But now that months passed, I’m fully aware of how to work it. Esteem needs is when you have prestige and feel accomplished. I can relate to this to technology because every time I prestige in the call of duty I feel accomplished. Every time I level up in a video game, I feel happy and proud of myself. Belonginess and love needs, are friendships and relationships. I can relate this to technology because I created a lot of relationships with people across the world, due to social media. Safety needs are your security and safety. I can relate to technology because I’m always secure online. I’m very self-aware of my online activity and I make sure to not click any links or give out any personal information. Physiological needs are food, water, warmth, and rest. I can relate this to technology because when your devices need to charge that’s like nutrition for them. Your cellular device needs all the charge so it can be rested and fully healthy. 

Journal 5

For money 

Multiple reasons

Political

Recognition

Boredom

Revenge

Entertainment 

I ranked for money first because that is the main reason people hack. People are trying to gain financial earnings illegally. Whether that’s swiping, scamming, etc. I put multiple reasons 2 because people have a lot of different reasons why they start hacking. Usually for power and money. I put political third because some people want political gain. I put recognition 4th because want to gain attention for their hacks. I put boredom 5th because a lot of people get bored and start hacking. I put Revenge 6 because people hack because they want revenge on a certain person. I put entertainment last because people shouldn’t be having fun. If you’re not gaining anything but excitement, you are hacking for the wrong reasons. 

Journal entry 6

There are a lot of phishing scams going on today. People are creating these fake websites to steal your information. That’s why it is very important to understand what makes a website real and fake. There are a lot of ways to spot a fake website. For example, you can study the address bar and URL, investigate the SSL certificate, verify the domain, check the website’s privacy policy, check the website for poor grammar or spelling, check the contact page, look up and review the company’s social media presence, etc. Now that you understand how to check if a website is legit, I will provide you with an example. 

These websites are fake

Due to spelling error

www.gooogle.com                                   

www.amxzon.com

www.hoomedepot.com

These websites are

Real. Proper url and proper formation

www.google.com

www.amazon.com

www.homedepot.com

Journal entry 7

  Meme 1: Using my computer on the edge

In this picture, a man uses his computer at the top of a building. 

It seemed like he was overwhelmed by the computer workload and he’s fed up. This relates to human-centered cybersecurity because he’s probably fed up with the workload and he’s over the edge.

Meme 2: Typing My Life Away at This Stupid Job. 

A female is typing at her job. It looks like she’s protecting the servers for cybersecurity. This relates to human-centered cybersecurity because she’s doing her duties to protect the company.

Meme 3: Drinking some coffee while working on his computer. 

In this picture, a man uses his computer in a coffee shop. He’s probably browsing on the internet using a public wifi connection. This relates to human-centered cybersecurity because hopefully, he isn’t on public wifis. This may cause him to get hacked. It demonstrates the potential modern threats.

Journal entry 8

The media has a major influence on cybersecurity. Considering most cybersecurity jobs pay 6 figures people are immediately interested. The media has this perception that cybersecurity stops hackers. Which it does, but the media makes it seem like hacking is easy. Hacking is very complex, and it takes time to learn. The media also has a perception that hacking is cool and fun. This is false, as hacking can get you plenty of time in jail. The media has also created a stereotype of how hackers look and what motivates them. The media perceives hackers as nerdy and weird people. While anybody can be a hacker. I feel like the whole perspective of cyber security is misunderstood as this field is very complex. Anybody can also fit the description of a hacker. They just must learn methods.

Journal entry 9

  1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again. No
  2. Regularly felt dissatisfied because you want to spend more time on social media. No
  3. Often felt bad when you could not use social media. No
  4. Tried to spend less time on social media, but failed? No
  5. Regularly neglected other activities (i.e. hobbies, sports, homework) because you wanted to use social media? No
  6. Regularly had arguments with others because of your social media use? Yes
  7. Regularly led to your parents or friends about the amount of time you spend on social media? No
  8. Often used social media to escape from negative feelings? No

9. Had serious conflict with parents, brother, sister (friends, relationships etc.) because of your social media use? No 

I got a 1 out of 9. I’m not addicted to social media at all. I can live without social media. So, I don’t have disordered social media users. 

Journal entry 10

Social cybersecurity is a national security that impacts welfare both conventional and nonconventional. Social cybersecurity focuses on cyber changes in human behavior, social, cultural, and political. While building cyber infrastructure needed for society so it can be a cyber informed environment. Social cybersecurity differs from traditional cybersecurity which involves humans using technology. The leverage advances in social cybersecurity advances as it involves targeted marketing, psychology, and persuasion, policy gaps between private and public government. People who research in this field leverage social science tools like network analysis, spatial analysis, semantic analysis, and machine learning. For the DOD to defend security of their country they must understand social cybersecurity and how it impacts their force, nation, and values.,

Journal entry 11

   Being a cybersecurity analyst can be very complex. This job requires a lot of responsibilities. There are a lot of social behaviors that come with being a cyber security analyst. Like networking, gaining an education, and understanding certain tactics. In the video she talked about phishing and other attacks that you need to be aware of. Hackers and cybercriminals are always looking to gain access to something. That’s why it’s very important to develop healthy social behaviors to keep the company protected. Cybersecurity is a very high demand job right now. So having these social behaviors will help you land a job in this field.

Journal entry 12

The two economic theories I’m choosing are Marxian economic theory and rational choice theory. Marxian economic theory is when people with power exploit those without power. This relates to the letter in a lot of ways. The attackers knew that the company had weak cybersecurity, so they took advantage of this and got people’s personal information. Rational choice theory is when businesses make choices in their best interest. When the company in the letter got attacked, they immediately invested in proper cybersecurity. This was the best rational choice possible, as this would prevent an attack from happening again. The two social science theories I’m choosing are determinism and parsimony. Determinism is when behavior is caused by preceding events. This relates to the letter because the attackers knew the company had weak cybersecurity, which caused the attackers to gain access and steal private information. Parsimony is when scientist keep their explanations as simple as possible. In this letter, they keep the information very simple and direct. They didn’t drag the information out, they wanted to bring awareness of the situation in the simplest way possible. 

Journal entry 13

This article studies companies receiving cybersecurity reports about vulnerabilities. The results showed that hackers are price-insensitive with an elasticity between 0.1 and 0.2. Research shows that bug bounties are useful for organizations of all sizes. However, organizations in certain industries received fewer reports than those in others. The new programs created greatly impact the number of reports organizations received on their Hacker One platform. Over time companies started to receive less valid reports. The study talks about the limited knowledge of bug bounty markets. The study emphasizes the need for future research to identify and measure certain variables over time that may influence the hacker supply. 

Journal entry 14

There are a lot of serious violations that you can commit on the internet. But faking your identity online is the most serious to me. This is an example of internet fraud which can get you a lot of time in prison. This is a federal crime. Collecting people’s information from those under 13 is also very serious. This violates the child online protection act. Which violates the consent of others. This can lead to serious time in jail. Cyberbullying and trolling is another serious violation. This can cause mental and physical harm to others. Excessive cyber bullying can lead to criminal offense charges and jail time. Doxing people is another serious offense. Revealing people’s personal information is illegal. Which can lead to jail time or a potential fine. It’s also illegal to take pictures of people without their consent. If you do this, it can lead to a potential sue

Journal entry 15

I was very interested in David Teo’s pathway to becoming a digital forensic science analysis. I have an interest in this career too, so it caught my attention. Digital forensic investigators study and collect data and use digital evidence to solve crimes. Social science plays a major role in digital forensic science, I say this because you must understand the social and psychological behaviors to solve them. I think he did an amazing job of explaining how he started. As he started off as an accountant and worked his way to the top. This is very motivational because you can start from anywhere.