CYSE201S

International Journal of Cyber Criminology Article Review #1

Cyber Criminology is the study of crime committed through digital means, such as the internet, social media, and other forms of electronic communication. The Psychodynamic theory can help explain why individuals may engage in cyber crime. According to this theory, experiences in your past lifetime and unconscious conflicts can drive behavior, including criminal behavior. By exploring the motivation of cyber criminals, researchers can gain better understanding of why they engage in criminal activities online. According to the Behavioral theory, behaviors are shaped by environmental factors, such as the people that you surround yourself with, as they can influence your actions. According to the Neutralization theory, individuals may use many techniques of neutralization to justify their criminal actions, such as denying responsibility or even weigh the risks and rewards to form an excuse. In the article “Cyber crime challenges in Iraq” the author discusses the challenges and the importance of creating digital awareness to prevent cyber crimes. Academic institutions in Iraq are very vulnerable to cyber attacks due to the lack of security protocols and limited resources. This study aimed to explore factors that contribute to enhancing the digital awareness among young students of schools and colleges. The factors were consolidated together in a correlation study to examine how their collective synergy could help in developing digital awareness. One research method they conducted was a research conceptual model containing 5 independent variables that were studied to determine their impact on the DA. This conceptual module was used to formulate 5 hypotheses wherein each independent variable exerted a significant effect on the dependent one. An online questionnaire develops indicating each variable to determine the level of Cyber security Awareness. The data collected from the questionnaire was analyzed through a descriptive data analysis. The article highlights the challenges that academic institutions in Iraq face in dealing with cyber crime and the need to create digital awareness to prevent crimes. Cyber security also relates to the article when the author discuses the various threats faced by academic institutions including hacking and data breaches. The need for cyber policies and procedures to manage the risks associated with cyber crime, establish protocols for data protection. Cyber laws in Iraq are still in the early stages of development and there is a lack of awareness among law enforcement agencies. Marginalized groups may face unique challenges in accessing resources and services related to cyber security. They may also be more vulnerable to cyberbullying and other forms of online hate and crime. This study contributed to the society by emphasizing the importance of developing comprehensive cybersecurity policies and protocols to prevent cyber threats. This study also contributed to providing insights into the challenges for addressing cybercrime in Iraq’s academic institutions, which can guide future research and policy efforts in Iraq.

https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/87/24

The Nature of Losses from Cyber Related Events Article Review #2

In this article that I read of “The nature of losses from cyber related events” there was some very interesting information included that really caught my attention. This article went into detail about the different types of losses that businesses can face due to cyber related incidents. During this article I have learned the three types of losses businesses can go through which include, non-financial loss, direct financial loss, and indirect financial loss. One theory that I believe relates to this article is the behavioral theory. According to the Behavioral theory, behaviors are shaped by environmental factors, such as the people that you surround yourself with, as they can influence your actions. In this article your actions responding to your employees and the environment which would be the cyber related events happening would be an example. Another theory that I think relates to this article but not directly is the Psychodynamic theory. According to this theory, experiences in your past lifetime and unconscious conflicts can drive behavior, including criminal behavior. In the article this relates to the people responding to the incidents. Lastly I believe the cognitive theory relates to this article partially. This theory focuses on the thought process and decision-making of those engaging in cyber attacks. This can help them provide insight on how people may react to cyber attacks and other issues. This article wanted to inform the reader about the importance of security and how crucial it is to protect your personal information. The research methods used for this were conducted within the Optus Macquarie university Cyber Hub and was not shared. One concept that relates to the article is classical experiments. Organizations have to conduct experiments to test their software to improve and strengthen their security. Cyber security also relates to this topic when the author discusses the financial losses due to the lack of security. Threats are also related to this topic as they are the main factor for the reason for financial loss in a majority of these companies. Marginalized groups may be targeted more during cyber attacks due to the fact of their lack of awareness. They would also face challenges of accessing and using resources in the work field along with financial issues. Overall this article provides an analysis of the different types of losses an organization can have and how they can react and improve from them. Additionally, in the article they identify risks that they face and develop strategies for them for people to incorporate into their daily life.

https://academic.oup.com/cybersecurity/article/9/1/tyac016/7000422

Career Professional Paper

The profession I decided to choose to write this paper about is a Cyber Security Analyst. They are trained professionals who are responsible for protecting an organization’s information and their systems from cyber attacks. They have to work to analyze, identify, and respond to security incidents and hacks to prevent them from happening as much as they can. CyberSecuirty Analysts also play a vital role in the IT world as technology continuously progresses. Your main responsibility is to protect the integrity, confidentiality, and availability of an organization’s information assets. Assessing and analyzing the security risks that the organization may face that an organization may face are some tasks you’d be required to do. Social Science research is very beneficial for cyber security employers as it provides us with crucial information. Social Science research can provide insights into how people make decisions and behave in different circumstances. This can help cybersecurity analysts to understand the factors that influence security behavior better. Four concepts that we’ve discussed in class that are applied in cybersecurity analysts include Vulnerability, Risk, threat, and Integrity. For vulnerability, they’re job is to identify and address the weaknesses and flaws in an organization’s IT application and system. Additionally, they must analyze the vulnerabilities, assess their impact, and recommend solutions to fix them. For risk, they play an important role in managing an organization’s cybersecurity risk. They must identify the potential risks along with managing the steps to eliminate these risks as well. For threats, they use a range of techniques to identify potential threats to an organization’s IT network. For example, they might suggest a security control change to reduce the likelihood of a cyberattack happening again. And lastly for integrity, they work to ensure that the information remains accurate and undisturbed during any processes. This can include monitoring for unauthorized changes to data and adding in recovery solutions. Marginalized groups could be more vulnerable to cyber attacks due to multiple factors including lack of awareness, limited access to resources, and poor decision making. Therefore, cyber security analysts can identify these problems and help work with people to help inform them and practice these strategies to be more aware and less vulnerable to these cyber attacks. Cyber Security analysts relate to society in a couple of ways to me. Firstly I believe they play a crucial role in protecting our society in the amount of cyber attacks that are happening around the world. Additionally, they do a great job in responding to cyber incidents by investigating the cause of the incident, and providing feedback to prevent more from happening in the future. Cyber security analysts don’t have an easy job as they have to be able to work with complete security software and systems while using critical thinking and problem solving skills to identify security threats.

https://techbootcamps.utexas.edu/blog/cybersecurity-analyst-job-description-role-breakdown/
https://www.wgu.edu/career-guide/information-technology/cybersecurity-analyst-career.html
https://www.imperva.com/learn/data-security/cybersecurity-risk-management/

Journal Entries

Journal entry #1

After reviewing the NICE framework I have collected enough information to consider where I want to focus my career on. I would most likely focus on the analyze and the threat and defend categories as they seem the most interesting to me. On the other hand, Operate and maintain appealed to me the least and I probably wouldn’t focus on.

Journal entry #2

The principles of science relate to cybersecurity in numerous ways. The principles can help to understand and analyze security threats and vulnerabilities and create effective strategies to decrease them.

Journal entry #3

Researchers can use this information shown about the breaches in multiple ways. From the graphs and images they can predict patterns and trends and gain information regarding where the breaches are occurring. Secondly they can analyze these breaches data and create prevention strategies to slow this down so organizations can create stronger security. Overall, researchers can gain information from data breaches to help prevent and decrease breaches for companies.

Journal entry #4

For physiological needs I’d say it relates to my experiences with technology by being a phone or laptop which I use daily. Just like water, I would need my daily technology like my phone everyday as I would need food or water to survive. For safety needs I’d say it relates to my experiences by being my security for my personal devices. This would be so I don’t get any viruses and attacks to my phone that would make me anxious or stressed over. For belongingness and love needs I’d say this relates with my social connections. Not really for me but for most people making more connections online and having more followers and friends makes them have a sense of belonging. For esteem needs I’d say this relates to my experiences with technology by feeling good from others online. Getting recognition and credit online from others makes you feel more confident and respected. For self actualization I would say this relates to my experiences with technology by reaching my full potential. This would include pursuing your goals and being seen by others that you are excelling online.

Journal entry #5

  1. Multiple reasons
  2. Political
  3. Boredom
  4. For money
  5. Entertainment
  6. Recognition
  7. Revenge

I ranked all of these in order of relevance and importance. I believe the first few are interesting and have great motives. Moving towards the middle I believe some are decent motives and are concerning. Lasty, towards the end I believe those are not in my interest and aren’t motives that are talked about at all.

Journal entry #6

Yes I can, The most obvious sign that gives away that the website may seem fake is the function of the website along with the design and layout of the website. I can compare two and see a difference in the connections and how much more professional the real one looks. Another few ways I can tell between real and fake websites are the grammatical errors and pop ups ads and links that would make it easy for me to spot that it’s fake.

Journal entry #7

In my opinion I believe human systems integration is really helpful to many people. They help us prevent errors, accidents, and improve efficiency. In this meme I included it shows the computer and person on the same page knowing that they know how you feel. An important key of human systems integration is to understand the user, and provide appropriate training and support.

Journal entry #8

After watching this video my view on cyber security has widened and changed the way I think of it now. Social media and the internet has an easy way of convincing people as it is their primary source of gaining information from. When watching real movies and tv shows they will tend to believe what’s going on due to the lack of acknowledgment they have on the particular subject. They will exaggerate or add more to the role of a cyber security employer as shown in the video to make them seem more exciting and powerful for entertainment purposes.

Journal entry #9

I scored only 2 out of 9 as I believe that I don’t have a social media disorder. I can go hours without my phone and social media as most people cannot say the same because it provides happiness and a source of entertainment for them. I think the items on the scale were great questions to help determine if you were really addicted to social media or not. I think different patterns are found around the world because the amount of people dependent on social media are different in each country and how they affect them.

Journal entry #10

After finishing reading this article, I found some interesting information that caught my attention. To begin with, the authors argue that social media has become a key component in communication and sharing vital information between people and organizations. I find this true as social media is evolving to the point where everything gets shared through it. This article also emphasizes the risks that come along with social media along with how dangerous it could be to many.

Journal entry #11

As a cyber security analyst you are the first line of defense in security and are monitoring the network or responding to incidents. Social behaviors like communications require cyber security analysts to respond to incidents with feedback on what changes should be made to decrease the rate of attacks. Civic duty also relates to cyber security analysts because they should be able to know the in and outs of systems to provide high security and minimize threats.

Journal entry #12

This article about bug bounty policies was very interesting to read and has given me a base understanding. This article talks about the bug bounties which are programs that offer rewards to people who discover and report security vulnerabilities in software. We are in high demand of this in today’s world due to the amount of threats increasing rapidly everyday. They believe this is an effective way to motivate people to report cyber weaknesses, which can be fixed before being attacked by hackers.

Journal entry #13

For economic theory the marxian theory suggests that someone with more power or money take advantage of those who don’t. In this case people with less power are more vulnerable and can be attacked more easily. Another theory is rational choice which suggests that businesses make choices in they’re best interest. In this case they chose not to invest in that much security and cybersecurity products.

Journal entry #14

After reading the authors says one of the top violations that I believe is the most serious is bullying and trolling. This can be seen as funny but also as very offensive as some people take their lives away due to this and should be taken more seriously. Faking your identity online is also very serious as you are portraying yourself as someone you arent which could also lead to dangerous choices and actions. Illegal searches on the internet are also very serious as you can go so many ways of unlawful activity with different searches resulting in consequences. Sharing others information is also a top violation as you can get someone’s identity taken and cause them to lose money and data by sharing their passwords. And lastly, collecting information about children is just wrong and inhumane as it will lead to many consequences and result to nothing good.

Journal entry #15

Starting his journey to his career he started off on the computer for long periods of time. He started with accounting and then transitioned to information technology which was very interesting. He has not had a smooth path to his career which I think is unique and different from others who already have they’re future set and straight.