Week 1 Journal

Withing the NICE framework there are many different fields to choose from to base your career path around. The ones most appealing to me are oversee and govern along with protect and defend. These are the ones I have been taking classes for and have been basing my career path around since high school.

Week 2 Journal

The principles of science relate to cybersecurity in the way that they’re internally linked. Many of the same ways that you go about making scientific discoveries is the same way you make discoveries in cybersecurity. Also, cybersecurity is an applied science so people in cybersecurity can use science to aid in their skills in cybersecurity.

Week 3 Journal

Privacyrights.org is a website where you can see a lot of information about data breaches. This information can be used to aid researchers in learning more about data breaches and their trends. On the website you can see how many breaches happened in a span of time, the type breach, where it happened, organizations with the highest amount of breaches, and much more information. Researchers can use all of this information to calculate trends, which org is the most prone to data breaches, how to prevent them, etc.

Week 4 Journal

Maslow’s Hierarchy of Needs is a diagram that suggests that all humans have needs that are on differing levels of importance to us, therefore a hierarchy. Digital technology can apply to any of these needs depending on the person. Technology can be a physiological need because you can use your phone or computer to order food or groceries. It can be a safety need because you can use your phone to contact authorities when you feel unsafe. It can be a love need so you can stay in contact with your loved ones. It can be an esteem need because social media is used to post yourself to other people so they can boost your self esteem. Finally, it can be a self actualization need because you can use it to be creative and put your good ideas to use and possibly make money.

Week 5 Journal

  1. Multiple reasons – this motive makes the most sense to me because I believe there is no one reason why anybody becomes cybercriminals, it takes a lot of factors for somebody to commit a crime of any kind.
  2. For money – this motive is the most common and can turn anyone to a life of crime because everybody needs money.
  3. Revenge – this leads into the victimization of cybercrimes because there are a lot of cybercrimes that are provoked.
  4. Recognition – this makes sense to me because a lot of people do it for fame, especially nowadays with how popular social media like TikTok has become.
  5. Political – this makes sense to me however I feel that it is less common than other options or rather there are less reports of this motive.
  6. Entertainment – as I stated above with the popular influence of social media there are a lot of people who simply commit cybercrimes for their own enjoyment.
  7. Boredom – this makes the least amount of sense to me however I can acknowledge with more minors than ever having access to the internet that this motive is become increasingly more common.

Journal week 6

What makes a website fake is grammatical errors, misinformation, and you browser saying the website is insecure.

20minuts[.]com

banned.video

beforeitsnews[.]com

Journal Week 7

The human systems integration was made to accommodate consumers and make technology as accessible as ever to as many people as possible.

Journal Week 8

The media makes cybersecurity seem like the only hacking that takes place is hacking for malicious intent when there are many more reasons for cyberattacks to take place.

Week 9 Journal

I scored very low on the scale and didn’t get the diagnosis of disordered social media user. I feel that the criteria used could be improved because everything can be different depending on the situation and context.

Week 10 Journal

I agree with this article in the fact that cybersecurity and how fast it is advancing poses a threat to national security and it is imperative that we have as much knowledge on it as possible. We need to fix any gaps in knowledge about all things cybersecurity and it is essential for our future.

Week 11 Journal

A cybersecurity analyst’s job relates to social behaviors in the context of understanding how cyber threats interact with human’s psychology.

Journal 12

This sample letter incorporates economic theories such as cost benefit analysis and information asymmetry theory. It also uses social science theories such as social support theory and trust theory.

Journal 13

I feel that this is an excellent way of finding vulnerabilities in companies databases. Using hacking as a way to pick out these vulnerabilities the same way that a unethical hacker would so a company can prepare for a real hacker is brilliant.

Journal 14

The offenses that I think are the most serious starts off with faking your identity online because that can have extensive consequences and identity theft is a felony. Collecting information is also one of the worst because it’s one of the most common and morally wrong. Recording another’s call can lead to legal action which gets it on this list. Using unofficial streaming services is on this list because it’s cost filmmakers a lot of money and is one of the most common. Finally, bullying and trolling is on the list because it can lead to fatal consequences.

Journal 15

I think the pathway to his career was a very good one and I will consider it if I decide to move over to the field.