Journal Entry 1
Prompt: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
After reviewing the NICE framework there are some aspects that I appeal towards and some that are not as appealing. One of the more appealing aspects are System Security management. As I have already taken Linux systems I have a small background in this area. Personally, it was very appealing to take the Linux course and would enjoy to pursue. The most disappointing aspect I saw was Cybersecurity Policy and Planning. Personally I like to be more hands on and code more often as far as this is more planning and a structure type of deal. Definitely would not mind taking a class in this but would not want to pursue a career in this.
Journal Entry 2
Prompt: Explain how the principles of science relate to cybersecurity.
Science helps in cybersecurity by using evidence and tests to understand and fix problems. In cybersecurity, experts look at data from past attacks to find weak spots and improve protection. They test systems by simulating attacks to see how they hold up. The scientific method guides this work, form an idea, test it, and use the results to make things better. This is used everyday and since cybersecurity does have a part of science behind it this can be used just the same. Just like science, cybersecurity needs constant updates because new threats keep coming. That is how cybersecurity relates to science. Some can even say the use of math relates to science which relates to cybersecurity.
Journal Entry 3
Prompt: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
Researchers can use the information on PrivacyRights.org to learn and educate themselves more about data breaches and their effects on them. Just by looking at the details of each breach, like how many records have been stolen, what types of data were used, and which organizations were affected, they can spot different trendlines and patterns. This is what helps them see if the current security measures that are taking effect are working or if more needs to be done. Additionally, by examining who was impacted and the whereabouts on where they live, researches can understand the wider impact of these breaches on society, including concerns about privacy and identity theft. This knowledge is what helps guide better policies and improve the ways to prevent and respond to breaches. Which is making it safer online.
Journal Entry 4
Prompt: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs can be clearly seen in my experiences with technology. At the physiological level, fitness apps help me monitor my overall health and wellness. Moving up to safety needs, I tend to rely on antivirus software and secure passwords to protect my vital information. For love and belonging, social media platforms like Facebook, Instagram and Snapchat connect me with friends and family, and fostering relationships. At the esteem level, sharing professional achievements on LinkedIn boosts my self-esteem and credibility. And finally for self-actualization, online courses and resources allow me to pursue personal growth and develop new skills, fulfilling my potential.
Journal Entry 5
Prompt: Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
With the ranking of what motives make the most sense, here are my answers. Number 1 is “Cyberbullying and online sexual grooming of children on the increase.” This is a very serious topic, and I think it deserves number one as the motive is a very serious issue. Number 2 would be “What Drives Hackers to Life of Cybercrime.” This is generally very important as it shows how it drives hackers to entice in crime. Next would be an “8-month suspended sentence.” It is also a very serious topic as it is about the UK general election. The next few are all generally not as important to me and seem to have the same motive. The motive I would say these are not as serious issues as the ones stated before. My list continues with “Revenge Porn Victims,” “Sex Drugs and Toilet Rolls,” then “Man Behind Linkdln.”
Journal Entry 6
Prompt: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
To spot fake websites and identify legitimate ones, there are several important factors to consider. First, check the URL, trustworthy sites usually begin with “https://” and display a padlock icon in the address bar, indicating a secure connection. Be wary of misspellings or unusual domain names, as scammers often use slight variations to mislead users. Examine the website’s design, professional and well-organized sites are more likely to be authentic. Additionally, look at the content for quality. Fake websites often contain poor grammar, spelling mistakes, or outdated information. Verify that there’s clear contact information and a physical address, as credible businesses typically provide these details. Customer reviews and ratings can also help, reputable sites often have testimonials or links to social media. There is many ways to spot these fake websites or scam websites. Lastly, trust your instincts on if this is a legitimate site.
Journal Entry 7
Prompt: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
https://docs.google.com/document/d/1jwUdREnOwEqGMd-ayCQtooII7GnDJyTHYocOlsG3k9c/edit?tab=t.0
Above is the link to this prompt since it has photos embedded.
Journal Entry 8
Prompt: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
After watching the video about hacking scenes in movies and TV shows, I realized how much the media influences our view of cybersecurity. These films often make hacking look super easy, like a lone hacker can just break into any system in a matter of seconds. This makes it seem like cybersecurity is a simple game, which isn’t true at all. In reality, it’s a complex and time-consuming process. I think this kind of portrayal can mislead people and make them underestimate the skills needed to protect against real cyber threats. We definitely need more accurate representations to understand just how important cybersecurity is and i think the media portrays that poorly. Also, not even on this topic alone but many others as the media always does not use real scenarios.
Journal Entry 9
Prompt: Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
During the past year have you…
1. Regularly found that you can’t think of anything else but the moment you will be able to use
social media again? Yes/No (Preoccupation).
2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No
(Tolerance).
3. Often felt bad when you could not use social media? Yes/No (Withdrawal).
4. Tried to spend less time on social media, but failed? Yes/No (Persistence).
5. Regularly neglected other activities (i.e. hobbies, sports, homework) because you wanted to
use social media? Yes/No (Displacement).
6. Regularly had arguments with others because of your social media use? Yes/No (Problems).
7. Regularly led to your parents or friends about the amount of time you spend on social media?
Yes/No (Deception).
8. Often used social media to escape from negative feelings? Yes/No (Escape).
9. Had serious conflict with parents, brother, sister (friends, relationships etc.) because of your
social media use? Yes/No (Conflict).
1. No
2. No
3. No
4. Yes
5. No
6. No
7. No
8. No
9. No
Based off only answering yes to one question it is said I do not have a disorder with social
media
Journal Entry 10
Prompt: Read this and write a journal entry summarizing your response to the article on social cybersecurity
Social cybersecurity is a new area of study that looks at how cyber threats can affect human behavior, society, and politics. It focuses on how technology can be used to spread false information and influence people, both by governments and other groups. Unlike traditional cybersecurity, which protects computer systems, social cybersecurity deals with “hacking” human behavior by using things like psychology and social science. This can have big effects, such as dividing societies, weakening trust in institutions, or causing chaos without physical violence. The spread of information online makes it easier for anyone to influence people around the world with little risk. This is what the article sort of represents and is how I perceive it as. There are definitely gr eat key points within this article this is just how i interpreted it and see it as.
Journal Entry 11
Prompt: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
As a cybersecurity analyst, I realize that the job isn’t just about protecting systems and data it’s also about understanding social behaviors and how people interact with technology. From the presentation, it’s clear that human actions, like clicking on a suspicious link or sharing too much personal information, can often be the weakest link in security. I’ve learned that cybersecurity analysts need to be aware of social behaviors such as trust, fear, and curiosity, which hackers often use to manipulate people into falling for scams or attacks. This makes it clear to me that considering human psychology is just as important as technical skills in preventing and responding to cyber threats. Social awareness plays a big role in keeping systems safe and I would love to partake within a Analyst job and I have a foreseeable future within that.
Journal Entry 12
Prompt: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
The “SAMPLE DATA BREACH NOTIFICATION” letter from Glasswasherparts.com connects to economic theories like cost benefit analysis, as the company weighs the costs of breach notification and customer protection against potential losses, and principal-agent theory, which examines the relationship between the company (principal) and its third-party provider (agent), whose security failure led to the breach. From a social science perspective, trust theory applies, as the breach will state the customers trust in the company’s ability to protect their data, and social exchange theory, which suggests customers expect fair treatment and protection in exchange for their data, is also relevant as the company must rebuild trust. So this is how the sample data breach notification links with economic theories by those confluences said in the passage.
Journal Entry 13
Prompt: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
I read the article on bug bounty policies, and I think it highlights an interesting connection between cybersecurity and economics. The literature review explains how these policies work as an incentive system, offering financial rewards to ethical hackers who find vulnerabilities in a company’s systems. This system is based on cost/benefit analysis, where companies pay less for bug bounties than for the damage caused by a cyberattack. The findings discussed in the article suggest that bug bounty programs can be very effective in identifying security weaknesses. However, there are challenges, such as ensuring the ethical hackers follow proper guidelines and avoiding exploitation.
Journal Entry 14
Prompt: Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Andriy Slynchuk talks about eleven things internet users do that could be illegal. The five most serious ones are hacking, identity theft, cyberbullying, sharing illegal content, and phishing. Hacking can steal personal information and cause big problems for people. Identity theft is when someone uses your personal details to commit crimes, which can ruin your financial life. Cyberbullying can lead to serious emotional harm, especially to young people. Sharing illegal content, like pirated videos or harmful images, is against the law and can have serious consequences. Phishing tricks people into giving away sensitive information, leading to fraud or identity theft. These actions are harmful and can cause major problems for others and that is why I think these offenses are serious and they can harm people in different ways.
Journal Entry 15
Prompt: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
Today, I watched Davin Teo’s TEDx talk about digital forensics, and it made me think about how his work connects to social sciences. Teo’s career started in law and later moved into technology, where he investigated digital crimes. This shows how understanding human behavior, which is key in social sciences, is crucial for a digital forensics investigator. People’s actions online can reveal patterns, just like studying society’s behaviors. Teo’s pathway reminds me that careers in forensics need both technical skills and an understanding of people, making it a mix of science and human studies.