Journal Entry 1- After reading all the different career paths on the Framework an area I would like to focus my career on is Protection and Defense (PD). When it comes to PD It would be a big focus on what I’m trying to do in the cybersecurity world. The goal is to become a Threat Analysis which is developed cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment. Also if I had to say which one would appeal the least to me would have to be Investigation (IN). It’s really hard to say which one catches my eye the least out of them all because they all are really great programs but if I had to choose one it would be Investigation (IN) which its pretty close to Threat Analysis but, also so different at the same time. But Investigation just don’t have enough Analysis opportunities for me. 

Journal Entry 2– The principles of science, such as empiricism, determinism, parsimony, and objectivity, are crucial for effective cybersecurity. Empircism. used data identify vulnerabilities. Determinism helps trace attacks to their source. Parsimony promotes efficient solutions. Objectivity ensures unbiased assessments. These principles, when applied together, create more reliable and effective cybersecurity systems. Also determinism emphasized that every security event has a cause, enabling incident response teams to trace attacks back to their origins. Parsimony promotes efficient security solutions, focusing on the simplest and most effective methods to achieve robust protection. Objectivity ensures unbiased security assessments, preventing personal biases from compromising the integrity of security measures.

Journal Entry 3– N/A

Journal Entry 4-Technology usually plays a direct role in addressing basic needs like smartphones, wearable, devices, and home automation systems. The need for affection and belonging can be met in part by connecting and interacting with other through social media platforms, messaging applications, and online communities. By making accomplishment and recognition easier, technology also helps to satisfy wants for respect. Social media, for example, can give users a forum to express. At the top the monument, electronics maybe a tool for artistry, individual development, and self-realization. Platforms like Youtube, TikTok, or even private blogs enable things to express their artistry and abilities.

Journal Entry 5- After reviewing the articles and having to rank all of the individual motive from 1-7, I will say multiple reason would be number 1 because it seem as what is the overall of what cybercrime is. But my second chose would be boredom because a lot of people goes through a phase of boredom and is sitting at home online just looking at random things which can lead into a lot of problem which the article talked about with the online grooming. Again the third chose would be revenge because is just seem more evil to me, and with the article I read about revenge porn and what stood out to me the most was “Social media companies need to be more responsible. The fourth individual motive would be entertainment, I really thought this one was just cool and funny to read about. The fifth would politics and this motive is ranked at fifth because it really was not understandable and it don’t entertain me. The six motive is recognition, really it had very good key points about social media like twitter but it has to stay at six. The last motive is for he money and this motive could have been higher to me because I really enjoyed reading over it but some of the details over not really understandable as well.  

Journal Entry 6-

I have chosen three fake websites, and I will be comparing them to real websites. Americannews.com, Liberalsociety.com, and conservation101.com are also how I could tell that all the websites were fake pages because they all uploaded false information that big platforms didn’t confirm, like American News posted about Denzel Washington endorsing Donald Trump for U.S. president, which was false information. Again, Liberalsociety.com published a fake direct quote attributed to Obama, and the White House fired Kellyanne Conway; also, conservation101.com posted the same information about Kellyanne Conway being fired. But if you were to go on these websites and take a look at them, you could tell the page is a fake by the main information that is being pushed on the home pages of all three fake websites. 

Journal Entry 7- So me explaining my meme would be pretty straight forward, me choosing my images for my memes was pretty difficult because I had some great options to choose from. Also all the images related to Human Centered Cybersecurity is some type of way. My first meme was the young lady sitting in the dark on the laptop in a control room, the image to me relate well to Human Centered Cybersecurity because of the biggest points of Human Centered Cybersecurity is understanding user needs and behaviors and that image looks like she was very focus on analyzing something or analyzing how a employee like herself interacts with technology. The second image I chose was pretty difficult because I could really turn it into a meme by all the different faces and moods that are in the photo. Also, the Clear security policies is a guideline that is being taught in a understandable way to a group of different employees. Now finally the last meme I used was somewhat understandable because I used the authentication method which is using easy to remember passwords that are not overly hard to forget.

Journal Entry 8- After watching the video that is linked , I gather information about how social media shapes our understanding of cybersecurity. It’s fascinating yet can be different how the portrayal of cyber threats can influence the public perception. On the other hand , the media highlights major data breaches and cyberattacks which create a sense of fear in the field. This can lead people to becoming more openly and understanding of the cybersecurity issues and prompting them to take precautions like using strong passwords, and also enabling two-factor authentication. However the media sensationalize stories which leads to misconceptions about the actual risks we face.  Also when a high- profile hack occurs sometimes it might create the impression that everyone is at constant risk of being targeted, which is very overwhelming 

Journal Entry 9- After completing the Social Media Disorder Scale, I learned a lot of different problems that are going on around the world. Also, I took the test myself, and I got four yeses, which was risky usage, and I think that was pretty accurate for my social life. And the items that were given in the scale are very understanding; I feel everything they asked I could relate to in some type of way. The biggest one for me is escape because I feel every time I’m stressed and overthinking, I feel that social media is my escape from reality. I feel as different patterns are found around the world because everyone is going through different problems with the social media world. Because the scale gives you a lot of different problems that regular people face on the daily.

Journal Entry 10- After reading the article, I gathered tons of different pieces of information about social cybersecurity. So, the safety of people and groups from the dangers that come from interacting with others, especially online, is called “social cybersecurity”. Its major goal is to protect people from social engineering attacks like phishing, impersonation, and other forms of manipulation. The attacks don’t use bugs in technology to their advantage; instead, they overly use the way people think and act. People are more aware of risk and also how to behave correctly online, and new cutting-edge tools are made to find and stop them. So, this is really why social cybersecurity is important for protecting both personal and business data.

Journal Entry 11-Someone who works in cybersecurity usually deals with a lot of important social problems. Also, talking to different people that are not on the same team as you is important because it helps with dealing with stopping threats.  Also, the analyst’s job is to protect private data, which shows how cybersecurity events affect society and how important trust and safety are in online interactions. So, the job title directly talks about how people work together in groups and how digital security affects society as a whole. Finally, a cybersecurity researcher has many responsibilities that go beyond their technical skills. It requires understanding, good conversation, a deep understanding of how people act, and the power to persuade others.

Journal Entry 12- After reading the letter that was provided from the link, one of the economics theories that relates to the letter is rational choice because individuals and businesses decide whether to invest in malware, and the letter spoke about platforms having to work with cybersecurity firms to remove the malware. Also, the second economics theory is Marxian economic theory, which is when individuals may be more vulnerable to cybersecurity threats. And the letter showed how someone’s information was easy to get, like the debit and credit cards. Now going into the social theories side, Social Contract Theory is related to the letter because customers trust companies to protect their personal information, and in the letter it starts because a customer trusted that they could make an online purchase using their information. However, the second social theory is labeling theory which this theory shows that change in the reputation can affect customers trust and behavior and can lead to the company being labeled as careless with data.

Journal Entry 13- The Bug boundary policy has a very large component of cybersecurity strategy, which is shown in the article. It reveals that bug bounty programs may be scalable and successful technique for finding vulnerabilities, even with the linked payments, which is particularly useful for businesses of different sizes and industries. However, these programs are a successful way to improve digital security because they match financial incentives with ethical hackers. Also, the programs must develop and grow over time in order to remain useful, especially if vulnerabilities become harder to identify as the program gets older over time, which the programs may still have identification problems.

Journal Entry 14-After reading the article and really understanding the eleven things that internet users do that are illegal I feel they all are very illegal, but the five most serious violations are using unofficial streaming services, using torrent services, using copyrighted images, sharing passwords, addresses, or photos of others, and trolling and bullying. So, I feel all of those offenses are very serious because all of the five violations could really cause harm to someone or even a unit of people, and not only that, but they all can really put someone behind bars. Finally, another reason why the five violations are serious is because most of the time a person does not have control or does not know how to handle what is happening to them online when going through the five violations. 

Journal Entry 15- There are some important connections between digital forensic study and the social sciences. First, it requires an understanding of the human natural, since investigators frequently has to look into the motives and behaviors of those who commit cybercrime. However, digital forensics professionals can truly comprehend the context of the digital evidence they found by utilizing sociological and psychological ideas. Social sciences also shed light on the ways in how technology makes a impact society. Workers in digital forensics need to understand the ethical and societal effects of their work, as well as privacy issues and data obtaining and analysis. Recognizing the social and legal structures that regulate the online conduct.