Explain how the principles of social science relate to cybersecurity.
All of the principles of science are connected with cybersecurity in some way. Relativism is the first principle and it explains that all aspects of life are related and can be changed by one another. Relativism is important in cybersecurity because of technological advancements changing our lives. We are becoming more and more dependent on technology to complete different types of tasks everyday. This creates more opportunities for cybercrime to occur. The next principle is objectivity. It is important for scientists to be objective when doing research. It can be hard in this field but we have to stick to logic.
You may think empiricism has nothing to do with cybersecurity, but it can have a little effect. It may have an effect because it appeals to at least one sense, which is sight. Ethical Neutrality is big in cybersecurity because when exploring cybercrime and how to keep individuals safe, an individual’s privacy is put at stake. Determinism plays a part in cybersecurity because someone can argue that previous events caused someone to commit cybercrime. The last principle of science is parsimony. Using parsimony is good in cybersecurity because it allows you to build a foundation for what you are looking into. Cybersecurity is a complex field so it will be good to start with something very simple.
________________________________________________________________________________________________________________
How might researchers use this data (https://privacyrights.org/data-breaches) to study data breaches?
Researchers can use this information to study the trends of data breaches in a certain time period. This may allow them to find weaknesses in certain systems. For example you can see that since 2015, St. Mary’s Credit Union has had the most data breaches out of any other organizations. This may indicate that they have a weak cybersecurity system but if you change the range of dates you can see that since the beginning of 2020, St. Mary’s Credit Union is not even top 10 in data breaches. This gives confirmation that whatever security measures they added in 2019 are effective. Another trend that this information shows is that most data breaches are hacks by an outside party or malware. There are also a large portion of breaches where the type is unknown, but you can assume that most of them are hacks based on the rest of the data.
________________________________________________________________________________________________________________
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.
Technology can aid or interrupt your ability to get basic needs. In today’s society individuals rely on online services like Uber eats and Grubhub to get food. There are also online services a person can use to find shelter. Technology is not always good, as it can hinder your ability to sleep. An example would be a high school student staying up all night playing video games. Technology is bigger than ever and social media is a huge part of it. Some people rely on finding friends on social media to fulfill physiological needs. There are several instances where a person goes online and finds the person that they end up marrying. In my experience, gaming can be a psychological need. Winning in some type of online tournament can boost confidence and make a person feel accomplished. As far as self-fulfillment needs there are multiple ways for a person to be creative and unlock their full potential online.
________________________________________________________________________________________________________________
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense to the least sense.
The motive I rank number one is “multiple reasons”. I put this at one because it makes the most sense that a person will commit a crime for multiple reasons instead of just one. Money is the motive I rank number two because the reason most people commit crimes is to get ahead in life. Getting money is the golden path to getting ahead in life. Next, at number three I have revenge. Revenge is powered by strong emotions and people will commonly commit crimes because of it. Committing crime for political reasons is the last motive that makes sense. That’s why I have it at number four. I have boredom and entertainment ranked at five and six. These two are the same to me and I don’t think it makes sense for you to commit a crime for entertainment. This is the case for multiple crimes but there is no logic for doing this. Finally, at number seven I have recognition. In most cases I think that the criminal’s intent is to not get recognized. If you get recognized that means that you will be punished for the crime you committed. Committing crimes for recognition has worked out for some people but this is an unnecessary gamble.
________________________________________________________________________________________________________________
Review the following photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
1. https://commons.wikimedia.org/wiki/File.jpg
Meme: When the boss calls everyone in for a team meeting because everyone clicked on the fake email he sent out.
Explanation: This meme shows that the precautions or lack thereof directly relate to the cybersecurity of an organization.
Meme: Trying to keep my sanity after getting the 500th phishing email today.
Explanation: This meme relates to human-centered cyber security because the person is recognizing phishing emails and not falling for them.
Meme: When the site I clicked on to claim my free prize asked for my social security number.
Explanation: This individual fell for a phishing attack and the hacker is now asking him for personal information. Even if he doesn’t give the hacker his personal information, his computer is most likely already compromised.
________________________________________________________________________________________________________________
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.
Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube
Media can inform and help audiences understand certain things about cybersecurity. Although the media displays some real aspects of cybersecurity and hacking, most of it is exaggerated or not true. So if you know nothing about cybersecurity, the content media shows can be very misleading. Media makes cybersecurity look more appealing to the audience by creating unrealistic visuals of code. For example, the video shows an unrealistic 3d animation of code that the hacker points out. The media portrays hacking as a really fast process, when in reality it takes a substantial amount of time. Cybersecurity is only viewed from one side in the media, as it only shows the ethical hacking portion.
________________________________________________________________________________________________________________
Complete the Social Media Disorder scale Links to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
In the Social Media Disorder Scale I only answered yes to the displacement question. The items in the scale are good at finding social media disorders if they are answered honestly. A person can use social media abundantly and still not have a social media disorder. I think that different patterns are found across the world because of the availability of technology and the internet. There is less of a chance for someone to have social media disorders when they don’t have up to date technology or reliable internet. In relation to cybersecurity, having a social media disorder can affect your company’s or your personal security online.
________________________________________________________________________________________________________________
Read this and write a journal entry summarizing your response to the article on social cybersecurity.
Exploiting social cybersecurity can be very detrimental to all of the targets. The talks of using this in a war are terrifying. Everyone today is scared of another world war because of the advanced weapons we have now, but less people seem to think of the technological side of it. Social cybersecurity and normal cybersecurity are really valuable targets for an opposing country to attack in war. If an attack happens focusing on social cybersecurity, the country can lose trust from its own people, soldiers, or possibly ally countries in war. This is why it is important to always have up to date security systems and trained cybersecurity professionals ready to defend.
________________________________________________________________________________________________________________
Watch this video: https://www.youtube.com/watch?v=iYtmuHbhmS0 Links to an external site.
As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
The cybersecurity analyst job description at an entry level is described as a cybersecurity helpdesk. This means you will have plenty of social interactions with the people that have been victimized and your peers. Some social themes that arise are customer service and teamwork. When monitoring something it is important to have a second opinion or point of view of something. That is why this job requires social bonding with your peers so you can work as a team effectively.
________________________________________________________________________________________________________________
Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
https://dojmt.gov/wp-content/uploads/Glasswasherparts.com.pdf
The first economic theory this sample breach letter relates to is the rational choice theory. The platform provider for the company in this letter probably did not invest in a good cybersecurity program to save money. This is why they did not find the malware in their system until almost a year later. The second economic theory this letter relates to is the Marxian economic theory. It relates to this theory because the hackers have power over the people they are victimizing by stealing their identity. Two social science theories that this letter relates to are the conflict theory and the social exchange theory. Conflict theory is shown by the hackers using their power to take away resources from individuals to use it for their own gain. The social exchange theory is shown by the company that is writing the letter trying to put as much as the blame as possible on the third party site. They are also offering help so that they maximize their profit by trying to keep as many customers as possible.
________________________________________________________________________________________________________________
Andriy Slynchuk – Links to an external site. has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
The first of the five most serious violations on this list is sharing passwords, addresses, or photos of others. This is serious because it can lead to an individual getting hacked or getting their identity stolen. The second is recording a voIP call without consent because sensitive information might be shared over the call. The next serious violation is faking your identity online. Not only can this get you in trouble, it can harm someone else if you are using their identity. Identity theft can be very detrimental to the victims even if the perpetrator is caught. Collecting information about children is also among the five most serious violations because the safety of the child will be at risk. In the worst case scenario the child could possibly be kidnapped or harmed. The last of the top five most serious violations on this list is illegal searches on the internet. Illegal searches on the internet can be connected to any crime an individual commits because they are searching for something to help them carry out that crime.