{"id":253,"date":"2024-12-09T03:02:32","date_gmt":"2024-12-09T03:02:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/?page_id=253"},"modified":"2024-12-09T03:31:47","modified_gmt":"2024-12-09T03:31:47","slug":"journals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/cyse201s\/journals\/","title":{"rendered":"Journals"},"content":{"rendered":"\n<p>Darius Burks<\/p>\n\n\n\n<p>September 2, 2024<\/p>\n\n\n\n<p>Journal 1<\/p>\n\n\n\n<p>After reviewing the NICE Workforce Framework, I have discovered that the Systems Security Management position sounds like an area I can focus my career on. The job description talks about examining the data from running analysis and making sure there are no security breaches and complications on the software. I will also oversee determining if baseline security safeguards are appropriately installed. Another role that looked interesting was to be a part of the Secure Project Management. My purpose would be to resolve conflicts in laws, regulations, policies, standards or procedures. An area that is least appealing to me would be the Cybersecurity Instructor. I would be responsible for training and conducting cybersecurity awareness to other people<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>September 10, 2024<\/p>\n\n\n\n<p>Journal 2<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In studying cybersecurity, we must stick to the scientific principles of relativism, objectivity, parsimony, ethical neutrality, and determinism. Relativism can be understood to mean all things are related. Objectivity refers to the way that scientist study topics in a value-free manner. Science does not support itself to promote an opinion rather, it exists to advance knowledge. Parsimony is defined for scientist to keep their magnitude of explanation as simple as can be. Ethical neutrality reflects to the fact that scientist must adhere to ethical standards when they are conducting their research. Determinism is behavior is caused, determined, or influenced by preceding events.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>September 16, 2024<\/p>\n\n\n\n<p>Journal 3<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If you were to look at the timeline, you would see it is categorized by organizations with the most to the least number of breaches. Researchers might use this information to see where the most breaches are occurring and how they continuously are able to hack into these systems. By acquiring this information, researchers and other members of the cybersecurity team, can delete any viruses and put up better overall security defenses on their web. On this website you can see the timeline on when, where, and how these organizations were breached. This can give researchers ideas on how these hackers are making their malware more advanced and undectable against regular system scans.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>September 25, 2024<\/p>\n\n\n\n<p>Journal 4<\/p>\n\n\n\n<p>Maslow\u2019s Hierarchy of Needs include self-actualization needs, esteem needs, love &amp; belongingness needs, safety needs, and physiological needs. Physiological needs relate to my experiences with me using technology for human survival. I would use it to cook and buy my food. It also relates to me having the home that I use for shelter. I relate to the safety needs by using automated locks, face ID, and cameras for protection. I relate to the love and belongingness needs with using my phone to keep in contact in my friends and family. I relate to the esteem needs by looking back on the old videos and pictures on my accomplishments I have completed in my life. I relate to the self-actualization needs by looking at motivational videos and realizing my potential and growth. &nbsp;&nbsp;<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>October 2, 2024<\/p>\n\n\n\n<p>Journal 5<\/p>\n\n\n\n<p>        I would rank the motives of crimes committed by individuals starting with Money. Money is number one because it is the root of all evil and it can persuade someone to do things that they wouldn\u2019t regularly do. Second is Revenge. Some people commit crimes because they have been wronged in the past so this get back would be a sigh of relief. Third is Political. Politics play a major role in our economy and many people want the way of life to go their way and when it doesn\u2019t, they are going to find a way to make sure it does. Entertainment comes next in the rank. A hand full of hackers enjoy the thrill of doing illegal activities and like going along with it. Some hackers want the recognition, so people know what they did either good or bad. The last two include being bored and other multiple reasons all tie in.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 6<\/p>\n\n\n\n<p>An example of a hacker trying to mimic being a real website would be in 2023 as a hacker uploaded a website. The fake website\u2019s URL read, \u201cpay-pail.com.\u201d It was trying to copy the website PayPal. You can see how it is spelled incorrectly and has additional digits in the name. There also was not a lock signifying that it is not a secure website. Another example of a fake website is \u201cwebelongin.umich.edu.lib.ir.\u201d As we look at the URL, we see there is no https:\/\/ and also the \u201c. lib.ir\u201d does not belong there. The real website is \u201c <a href=\"https:\/\/webelong.umich.edu\">https:\/\/webelong.umich.edu<\/a>.\u201d A very common mistake that users make are believing the USPS tracking scam. You receive a email that there is an issue with the delivery, and they need you to confirm your address and your payment method.<\/p>\n\n\n\n<p>\ufeff<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 7<\/p>\n\n\n\n<p>When my dog figures out, he must protect his online<\/p>\n\n\n\n<p>information too.<\/p>\n\n\n\n<p>When you\u2019re assigned to teach elderly people how to work computers.<\/p>\n\n\n\n<p>Me when I learn how easy it is to keep my information safe and protected.<\/p>\n\n\n\n<p>My memes relate to the human centered cybersecurity by showing us that it is important for you to take responsibility for making sure that your privacy on the internet is secure, and all of your information is protected against hackers and unwanted malware. As a human, you would like to check on your security and know that it is secure and have the help of technology to check over for any mistakes that have been made. Human-centered cybersecurity involves the\u00a0social, organizational, and technological influences on people\u2019s understanding of interactions with cybersecurity. By taking a human-centered cybersecurity approach, we can both improve people&#8217;s cybersecurity experiences and achieve better cybersecurity outcomes.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 8<\/p>\n\n\n\n<p>Media can influence the understanding of cybersecurity in a number of ways such as news media coverage, social media, and being portrayed in films and television. The news media coverage of cybersecurity helps the public have a better understanding of the roles of cybersecurity companies in setting policies. Social media can be used to spread misinformation or \u201cFake News\u201d. Scammers and hackers can also use social media to send phishing scams and emails. Cybersecurity in films help the media show depictions that can shape public perception, ranging from realistic to philosophical. Media has a major influence on the way people think and operate in their daily lives.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 9<\/p>\n\n\n\n<p>Based on the scale I answered No, No, No, Yes, No, No, No, Yes, No. I think I do not have a problem on social media. I have self-control and know how to handle my time on social media and keep it to a minimum. I believe I watch and fill my head with the right activities on social media. The items on the list make it seem like it\u2019s scaling you on having an addiction to social media by asking these specific questions. There are different patterns found across the world are because people use social media for dissimilar reasons. Some use it for business, pleasure, promoting, and many more.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 10<\/p>\n\n\n\n<p>Social cybersecurity can be a positive and negative to people all around the world. It benefits us and those we see as our adversaries. Cybersecurity is changing the battlefield on all levels of war. We can use cybersecurity to protect our sensitive information from those whose sole purpose is to hurt us, and we can also use cybersecurity to learn information on things that can benefit America. Propaganda and the internet have a powerful influence over the world and those who view the media. It can be a good or a bad thing to get all your information from the news and put all your trust on the news.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 11<\/p>\n\n\n\n<p>As a cybersecurity analyst you begin out my respond to phishing attacks, intrusion attacks, and monitoring the network. As a cybersecurity analyst there is a no limit for the jobs and positions and there is no limit to where you can work. Every major corporation and government agency need cybersecurity analyst to monitor their network. Cybersecurity analysts are in demand, not only in America but all over the world. The wage they make is very accommodating and allows you to live in places where rent or mortgages are not that high. With becoming an analyst, you are very versatile with how you can do your work and how your company can use you.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 12<\/p>\n\n\n\n<p>In this sample breach letter, we use different social sciences theories such as symbolic interactionism and rational choice theory. Symbolic interactionism is used in the letter when it is offering you and other affected customers by the accident, about the tools you can use to protect themselves against possible identity theft. The rational choice theory is also associated with the help of setting up guidelines for you to follow in order to protect yourself. The types of economic theories that were used were tragedy of commons and market socialism. Tragedy of commons is used in an economic situation in which every individual has an incentive to use a resource, but at the expense of every other individual and there is no means to prevent anybody from doing so.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 13<\/p>\n\n\n\n<p>In this article, it discusses the Bug Bounty programs in their economic implications. There are six policies that were focused on, Vulnerability Disclosure Policies, Financial Incentives, and Economic Behaviors in firms, Public vs. Private programs, Financial and Operational cost of Bug Bounty Programs, and the Economic value of Bug Bounties. Bug bounty programs effectiveness and growth are influenced by financial incentive and the market dynamics around the hacker supply and demand. A big factor states that a large percentage of companies (93% of firms) lack Vulnerability Disclosure Policies. The lack of VDP\u2019s prevents third parties&#8217; researchers from submitting vulnerabilities to organizations without fear of legal consequences. \u00a0<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>&nbsp;Journal 14<\/p>\n\n\n\n<p>I believe the 5 most serious violations that internet users do that are illegal are bullying and trolling, faking your identity online, illegal searches on the internet, using copyrighted images, and recording a VoIP call without consent. Bullying can lead people into stressful situations in their life that is not needed. It can also lead them to do acts that can cause harm to themselves. Faking your identity can lead to people believing information that they think is correct. Other people could believe you are providing them with important information, and you are not who you say you are. This also falls into the trolling category. Having free will on the internet is a good and bad thing. People who use the internet for mischievous purposes have access to all type of information. It can get dangerous if sensitive information is presented to the wrong group of people with bad intentions. Having copyrighted images is harmful for those who either worked hard to create them just for you to take them and call them your own or you use them in a way that it was not intended for. Finally, recording a call without the other person\u2019s consent is very illegal because there could be information that was expressed between each other that did not need to be released or recorded for the public\u2019s findings. It\u2019s a broken of trust.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>Darius Burks<\/p>\n\n\n\n<p>Journal 15<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The work of digital forensics investigators draws from multiple social science principles like human behavior and social impacts surrounding digital data. By applying principles from psychology, sociology, criminology, law, and ethics, digital forensics professionals ensure that their investigations are comprehensive and socially responsible. The speaker and I have a similar experience with getting into the field of Cybersecurity. One of our parents introduced us into the field. For me, it was my mom who thought it would be a good idea to start cybersecurity and learn more on how to operate the computers and learn how to protect myself online and teach others how to do o as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Darius Burks September 2, 2024 Journal 1 After reviewing the NICE Workforce Framework, I have discovered that the Systems Security Management position sounds like an area I can focus my career on. The job description talks about examining the data from running analysis and making sure there are no security breaches and complications on the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dariusburks2024\/cyse201s\/journals\/\">Read More<\/a><\/div>\n","protected":false},"author":29538,"featured_media":0,"parent":245,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/pages\/253"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/users\/29538"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/pages\/253\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/pages\/253\/revisions\/254"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/pages\/245"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dariusburks2024\/wp-json\/wp\/v2\/media?parent=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}