{"id":295,"date":"2025-01-18T19:30:40","date_gmt":"2025-01-18T19:30:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david-knoepp\/?page_id=295"},"modified":"2025-04-28T02:46:54","modified_gmt":"2025-04-28T02:46:54","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/david-knoepp\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Week 1 journal entry<\/strong><\/h2>\n\n\n\n<p>&#8220;Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas would appeal&nbsp;the most to you and which would appeal the least.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p>After checking out the NICE Workforce Framework, I think the areas that interest me the most are Analyze and Protect and Defend. The Analyze part seems really cool because it\u2019s all about investigating cyber threats and figuring out how they happened, kind of like solving a mystery, which I\u2019ve always found fun. I also like Protect and Defend because it\u2019s about creating systems to stop cyberattacks and keeping everything safe, which sounds challenging and important.<\/p>\n\n\n\n<p>The area I\u2019m least interested in is Operate and Maintain. While it\u2019s definitely necessary to keep systems working, it seems like it could get boring after a while. I\u2019d rather focus on solving problems and thinking critically about bigger challenges.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">week 2 journal entry<\/h2>\n\n\n\n<p>The principles of science, like empiricism, determinism, parsimony, and objectivity, are super important in cybersecurity. Empiricism is about using evidence and data, which helps when analyzing threats or testing security solutions. Determinism focuses on cause and effect, so it\u2019s useful for figuring out what causes vulnerabilities or predicting attack patterns. Parsimony means keeping things simple, which is great for designing systems that are easier to manage and less likely to have errors. Objectivity makes sure decisions are fair and unbiased, especially when investigating hacks or choosing the best security tools.<\/p>\n\n\n\n<p>By following these principles, cybersecurity experts can create strategies that actually work, protect systems better, and adapt to new threats as they come up. It\u2019s all about being smart and scientific in keeping systems safe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 3 journal entry<\/h2>\n\n\n\n<p>PrivacyRights.org provides a lot of useful information about data breaches that researchers can use to study how and why they happen. By looking at the data, they can find patterns, like which industries get hacked the most and what types of attacks are common, such as phishing, malware, or insider threats. Researchers can also see how these breaches affect businesses and individuals, leading to financial loss, identity theft, or new security regulations. This information helps cybersecurity experts come up with better ways to prevent future attacks. They can also compare different industries, like healthcare and finance, to see which ones are most at risk and why. By analyzing trends over time, researchers can even predict future threats and recommend stronger security measures. Overall, PrivacyRights.org is a valuable resource for understanding cybersecurity risks and improving data protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 4 journal entry<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 5 journal entry<\/h2>\n\n\n\n<p>I think the most reasonable motive for cybercrime is\u00a0<strong>(1) money<\/strong>\u00a0because a lot of hackers want to make a profit by stealing data, committing fraud, or using ransomware. It makes sense since money is a big motivator for people in general.\u00a0<strong>(2) Revenge<\/strong>\u00a0comes next because some people hack out of anger, like getting back at an ex or a former employer.\u00a0<strong>(3) Political motives<\/strong>\u00a0are also pretty common since hacktivists use cyberattacks to push their beliefs or protest against governments.\u00a0<strong>(4) Recognition<\/strong>\u00a0is another reason, as some hackers just want to prove how skilled they are and get attention.\u00a0<strong>(5) Multiple reasons<\/strong>\u00a0come next since many hackers don\u2019t just have one motive, they might want money, revenge, and recognition all at once.\u00a0<strong>(6) Entertainment<\/strong>\u00a0is a weaker motive, but some hackers do it just for fun. Finally,\u00a0<strong>(7) boredom<\/strong>\u00a0seems like the least convincing reason. It\u2019s hard to believe someone would commit cybercrimes just because they have nothing better to do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 6 journal entry<\/h2>\n\n\n\n<p>Identifying fake websites is crucial to protecting personal information. One common tactic used by scammers is typosquatting, where they create URLs with slight misspellings or character substitutions. For example, a fake website like\u00a0<strong>&#8220;<a href=\"http:\/\/www.paypa1.com\/\">www.paypa1.com<\/a>&#8220;<\/strong>\u00a0replaces the letter &#8216;l&#8217; with the number &#8216;1,&#8217; making it look similar to the legitimate\u00a0<strong>&#8220;<a href=\"http:\/\/www.paypal.com\/\">www.paypal.com<\/a>.&#8221;<\/strong>\u00a0Another example is\u00a0<strong>&#8220;<a href=\"http:\/\/www.amaz0n.net\/\">www.amaz0n.net<\/a>,&#8221;<\/strong>\u00a0where the &#8216;o&#8217; is replaced with &#8216;0,&#8217; and the domain extension is changed from &#8220;.com&#8221; to &#8220;.net&#8221; to trick users into thinking they are on\u00a0<strong>&#8220;<a href=\"http:\/\/www.amazon.com\/\">www.amazon.com<\/a>.&#8221;<\/strong>\u00a0Similarly,\u00a0<strong>&#8220;<a href=\"http:\/\/www.goggle.com\/\">www.goggle.com<\/a>&#8220;<\/strong>\u00a0is a deceptive misspelling of\u00a0<strong>&#8220;<a href=\"http:\/\/www.google.com\/\">www.google.com<\/a>.&#8221;<\/strong>\u00a0These fraudulent websites often lack HTTPS encryption, use poor design, or contain misleading trust seals. To avoid falling victim to such scams, always verify URLs for correct spelling, check for HTTPS security, and look for official trust seals that can be authenticated. (<a>DigiCert<\/a>,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Typosquatting\">Wikipedia<\/a>)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 7 journal entry<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 8 journal entry<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 9 journal entry<\/h2>\n\n\n\n<p>I scored a 1 on the Social Media Disorder scale, which means I have regular usage of social media but don\u2019t seem to experience any major problems with it. I think that\u2019s a pretty balanced place to be because I use social media to stay connected with friends, check out what\u2019s going on in the world, and pass time when I\u2019m bored, but it doesn\u2019t take over my life. Some of the items on the scale really made me think about how easy it is for people to get addicted to social media without even realizing it. For example, questions about losing track of time or feeling stressed when you can\u2019t check your social media seemed like things that could happen to anyone if they\u2019re not careful.<\/p>\n\n\n\n<p>I also think it\u2019s interesting that different patterns of social media usage are found around the world. In some places, people might rely on social media more because it\u2019s their main way to stay in touch with others or get news and information. In other places, people might use it less or in different ways depending on their culture or how much access they have to the internet. Overall, social media has a lot of positives, but it\u2019s clear that it can also cause issues if you\u2019re not paying attention to how much time you spend on it or how it affects your life. That\u2019s why it\u2019s important to stay aware and make sure that social media doesn\u2019t become a problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 10 journal entry<\/h2>\n\n\n\n<p>The article talks about how cyber threats don\u2019t just attack computers, they also mess with people\u2019s minds and society. It explains how things like fake news and online manipulation can cause chaos and even affect national security. The author says we need to combine cybersecurity and social science to stop these threats. I thought it was really interesting because it shows how hackers don\u2019t just steal data; they also trick people into believing lies. It made me realize how important it is to think critically about what we see online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 11 journal entry<\/h2>\n\n\n\n<p>The video explains that being a cybersecurity analyst isn\u2019t just about working with computers, it also involves a lot of teamwork and communication. Analysts have to work with different people in a company, from IT teams to managers, to keep everything secure and respond to cyber threats. The job also requires constant learning because hackers are always coming up with new ways to attack, so staying updated on the latest technology and trends is crucial. Analysts also have to think like the attackers to stay ahead of them, which means they need strong problem-solving skills. Another big part of the job is protecting people\u2019s personal information, which helps keep businesses and communities safe. It also emphasizes how cybersecurity is all about trust, and without it, people could lose confidence in digital systems. It really shows how cybersecurity isn\u2019t just a tech job, it also has a big social impact, making sure people feel secure and safe in a digital world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 12 journal entry<\/h2>\n\n\n\n<p>The sample data breach notification letter from Glasswasherparts.com shows how economics and social science ideas connect to real-world problems. One economic theory that relates to the letter is cost-benefit analysis. This is when a company decides if the cost of doing something, like improving cybersecurity, is worth it compared to the possible losses from something bad happening like a data breach. In this case, it seems like the company didn\u2019t invest enough in security, and now they\u2019re dealing with the consequences, which probably cost more in the long run. Another economic theory is externalities. That\u2019s when a company\u2019s actions affect other people who weren\u2019t directly involved. The data breach hurt the customers by putting their personal information at risk, even though they didn\u2019t do anything wrong. This shows how the company&#8217;s decision had negative effects on others.<\/p>\n\n\n\n<p>From a social science perspective, one theory that fits is neutralization theory. This is when people or companies try to make their actions seem less bad. In the letter, the company says they aren\u2019t aware of any actual misuse of the information, which might be their way of downplaying the situation to avoid blame. Another social science theory that connects is crisis communication theory. This theory is about how organizations deal with bad news and try to keep people\u2019s trust. In the letter, the company explains what happened, what they\u2019re doing about it, and gives people steps they can take to protect themselves. This shows they\u2019re trying to manage the situation and keep their reputation. Overall, the letter is a good example of how both economic and social science theories apply to real cybersecurity problems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 13 journal entry<\/h2>\n\n\n\n<p>Bug bounty programs are designed to address the growing cybersecurity concerns by engaging freelance hackers to find vulnerabilities within companies\u2019 systems. These programs offer companies a cost-effective way to identify weaknesses in their cyber infrastructure, especially for smaller organizations that may not have the resources to hire full-time security experts. The article discusses how bug bounty programs help by leveraging a global network of ethical hackers who bring diverse skill sets and perspectives, making it easier for companies to detect issues that internal teams might miss. Additionally, the growing trend of bug bounty programs has led to the rapid increase in payouts, with major platforms like HackerOne paying out hundreds of millions of dollars to researchers. However, the article also highlights the challenges in measuring the effectiveness of these programs, particularly due to factors such as industry differences and program age. The research presented in the article suggests that even small companies with fewer resources can still derive significant cybersecurity benefits from participating in bug bounty programs, which is encouraging news for organizations that struggle to compete with larger, well-funded corporations in the cybersecurity space.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 14 journal entry<\/h2>\n\n\n\n<p>In the article by Andriy Slynchuk about illegal things people do online, there are five violations that seem the most serious to me. First, collecting information about children is a big deal because it can lead to kids being targeted or exploited, which is really dangerous. Second, faking your identity online can cause a lot of harm, like tricking people or stealing their money. Third, sharing other people\u2019s passwords, addresses, or photos without asking them is a huge invasion of privacy and can lead to bullying or identity theft. Fourth, cyberbullying and trolling are serious because they can hurt people emotionally and even lead to depression or worse. Lastly, using unofficial streaming websites might not seem that bad, but it\u2019s actually illegal and can infect your device with viruses. These things are all serious because they don\u2019t just break the law they can really hurt people in real life.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">week 15 journal entry<\/h2>\n\n\n\n<p>After watching Davin Teo&#8217;s TEDx talk, I thought it was really interesting how he ended up working in digital forensics. He actually started out in accounting, which isn\u2019t something you usually think would lead to a career in tech. I liked how he showed that you don&#8217;t always have to take a straight path to find your career \u2014 sometimes different skills can still help you get where you want to go.<\/p>\n\n\n\n<p>I also realized that digital forensics connects a lot to the social sciences. It&#8217;s not just about computers and hacking; it\u2019s also about understanding people. Like, when someone commits a cybercrime, investigators need to figure out why they did it, what their patterns are, and what kind of behavior to look for. That\u2019s where things like psychology and sociology come in.<\/p>\n\n\n\n<p>Another thing Teo talked about was ethics. He made it clear that digital forensics isn\u2019t just about finding evidence \u2014 it\u2019s about being fair and thinking about the people behind the data. I thought that was really important because sometimes people forget there\u2019s a real person on the other side of the screen.<\/p>\n\n\n\n<p>Overall, I thought Davin Teo\u2019s story was cool because it showed that you can bring different experiences into a career, and that digital forensics isn\u2019t just about technology \u2014 it\u2019s about people too.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #1 <\/h2>\n\n\n\n<p>Impact of Cybersecurity and AI\u2019s Related Factors on Incident Reporting<br>Suspicious Behavior and Employees Stress<\/p>\n\n\n\n<p>David Knoepp<br>February 16, 2025<br>BLUF<br>This study looks at how cybersecurity measures and AI-related factors affect employees\u2019 stress<br>levels and their willingness to report suspicious activity. It also explores how cybersecurity<br>training can help reduce stress and improve reporting behavior. The findings show that proper<br>training makes employees more likely to report incidents and feel less stressed about<br>cybersecurity threats.<br>Introduction<br>Cybersecurity is a big deal in today\u2019s digital world, and it\u2019s important to understand how it<br>impacts people in the workplace. This article, written by Vimala Venugopal Muthuswamy and<br>Suresh Esakki, focuses on how AI and cybersecurity policies affect employees\u2019 stress and their<br>decision to report suspicious activities. The study is useful because it connects cybersecurity with<br>psychology and workplace behavior, which are key areas of social science.<br>Research Questions &amp; Hypotheses<br>The main question this study asks is: How do AI-related cybersecurity factors influence<br>employees\u2019 stress and their likelihood of reporting suspicious behavior? The researchers<br>hypothesize that AI-driven cybersecurity systems can either increase or decrease employee<br>stress, depending on how well employees understand and interact with these technologies. They<br>also predict that cybersecurity training will help reduce stress and improve reporting.<br>Research Methods<br>This study used a survey-based research method. Employees from different organizations were<br>asked about their experiences with cybersecurity, AI technologies, and their willingness to report<br>security threats. The researchers used statistical analysis to find patterns in the responses and<br>determine how different factors affected employee stress and reporting behavior.<br>Data &amp; Analysis<br>The researchers collected survey responses from employees in various industries. They analyzed<br>the data using statistical models to see if there were connections between AI-driven<\/p>\n\n\n\n<p>cybersecurity factors, employee stress levels, and incident reporting. The results showed that<br>employees who received proper cybersecurity training felt less stressed and were more likely to<br>report suspicious behavior. On the other hand, employees who didn\u2019t get enough training felt<br>more overwhelmed and avoided reporting incidents.<br>Connections to Course Concepts<br>This study connects several social science concepts we\u2019ve talked about in class, like<br>organizational behavior, workplace stress, and the psychology of decision-making. It also ties<br>into cybersecurity ethics, since employees play a major role in keeping systems safe. The study<br>highlights the importance of cybersecurity training, which aligns with the idea that awareness<br>and education are key to reducing risks.<br>Impact on Marginalized Groups<br>The study doesn\u2019t focus specifically on marginalized groups, but its findings are still relevant.<br>Employees in lower-paying jobs or those with less access to technology training may struggle<br>more with cybersecurity stress. If companies don\u2019t offer proper training, these employees might<br>feel more anxious about making mistakes, which could discourage them from reporting security<br>threats.<br>Societal Contributions<br>This study is important because it shows that good cybersecurity training can make workplaces<br>safer and less stressful. When employees understand AI-driven security systems, they\u2019re more<br>likely to take action against threats instead of ignoring them. Companies can use these findings<br>to create better training programs, which will help prevent cyberattacks and protect sensitive<br>information.<br>Conclusion<br>Overall, this study provides valuable insights into how cybersecurity and AI affect employees in<br>the workplace. It shows that training plays a big role in reducing stress and improving security<br>reporting. The findings suggest that companies should invest more in cybersecurity education to<br>create a safer and more informed workforce.<br>References<br>Muthuswamy, V. V., &amp; Esakki, S. (2023). Impact of Cybersecurity and AI\u2019s Related Factors on<br>Incident Reporting Suspicious Behavior and Employees Stress: Moderating Role of<br>Cybersecurity Training. International Journal of Cyber Criminology.<\/p>\n\n\n\n<p><a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/download\/330\/99\/637\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/download\/330\/99\/637<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #2: <\/h2>\n\n\n\n<p>Cybersecurity when Working from Home during COVID-19: Considering<br>the Human Factors<br>David Knoepp<br>April 6, 2025<br>Introduction<br>The COVID-19 pandemic changed the way people work, with many businesses shifting to<br>remote work. This created new challenges for cybersecurity, as employees worked from home<br>with less oversight. The article &#8220;Cybersecurity when Working from Home during COVID-19:<br>Considering the Human Factors&#8221; by Monica T. Whitty and others, published in the Journal of<br>Cybersecurity in 2024, looks at how human factors affect cybersecurity when people are working<br>remotely. (academic.oup.com)<br>Connection to Social Science Principles<br>This study connects to social science ideas because it focuses on how people\u2019s actions and<br>behaviors impact cybersecurity. It shows how employees&#8217; attitudes and their understanding of<br>security practices can affect how safe the work environment is. The article looks at how<br>individuals, within their work culture, contribute to or reduce cybersecurity risks.<br>Research Questions and Hypotheses<br>The article asks: How do human factors influence cybersecurity for people working from home<br>during COVID-19? The researchers believe that because many workers were not trained<br>properly, and because home environments are less secure, the risk of cybersecurity issues<br>increased.<br>Research Methods<br>The researchers used surveys and interviews to collect data. The surveys were given to remote<br>workers to learn about their experiences with cybersecurity at home. The interviews gave the<br>researchers deeper insights into the specific challenges people faced, like not having secure<br>systems or understanding security measures.<br>Data and Analysis<br>The data collected from surveys were analyzed using statistics to find patterns, like whether<br>employees who received more training had fewer security issues. The interviews helped the<br>researchers understand the personal experiences behind the numbers. They identified common<br>themes, like people\u2019s frustrations with balancing work and personal life in a digital world.<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyae001\/7588826?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p>Connection to Course Concepts<br>The article connects to the concepts we\u2019ve learned in class about how human behavior affects<br>cybersecurity. The PowerPoint presentations from class emphasized that cybersecurity is not just<br>about technology but also about how people use it. This article shows that people\u2019s actions\u2014like<br>using weak passwords or clicking on suspicious links\u2014can make cybersecurity harder to<br>maintain.<br>Implications for Marginalized Groups<br>The article also talks about how marginalized groups might be more affected by cybersecurity<br>risks. For example, some people may not have access to the latest technology or security<br>training. The article suggests that businesses should make sure all employees, regardless of their<br>background, have the resources they need to stay secure while working from home.<br>Contributions to Society<br>This research helps society by showing that cybersecurity isn\u2019t just about technology, but also<br>about people. By understanding human behaviors and challenges, businesses can create better<br>security policies that protect everyone. This can help reduce the number of cyberattacks, which<br>would make the digital world safer for everyone.<br>Conclusion<br>The article by Whitty and others teaches us that human factors play a big role in cybersecurity. It<br>reminds us that, especially in remote work environments, we need to focus on both technology<br>and people to keep things secure. The study gives good advice on how to improve cybersecurity<br>practices in the future, especially as more people continue working from home.<br>References<br>Whitty, M. T., et al. (2024). Cybersecurity when working from home during COVID-19:<br>Considering the human factors. Journal of Cybersecurity, 10(1). (academic.oup.com)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">career paper<\/h2>\n\n\n\n<p>David Knoepp<br>Cybersecurity Career Professional Paper<br>CYSE-200: Cybersecurity, Technology &amp; Society<br>April 13, 2025<br>Cybersecurity Awareness and Training Specialist: A Career That Helps People Stay Safe Online<br>BLUF (Bottom Line Up Front):<br>Cybersecurity Awareness and Training Specialists help people learn how to stay safe online.<br>They use ideas from social science, like how people think and act, to teach good cybersecurity<br>habits. They also make sure everyone, including people from marginalized groups, can<br>understand and follow safety practices.<br>Introduction<br>When most people think about cybersecurity, they think of computers, coding, or hacking. But<br>there\u2019s a very important side of cybersecurity that\u2019s all about people. That\u2019s where Cybersecurity<br>Awareness and Training Specialists come in. Their job is to help others learn how to avoid<br>online dangers like scams or phishing emails. To do this, they use ideas from social sciences\u2014<br>like psychology, sociology, and communication. This paper talks about how this career uses<br>those ideas, how it connects to what we\u2019ve learned in class, and why it\u2019s important to society and<br>to people from different backgrounds.<br>How Social Science Is Used<br>This career depends a lot on understanding how people think and behave. For example, people<br>don\u2019t always follow security rules, even when they know them. Awareness specialists use<br>psychology to figure out why. They know that if people feel confident and understand the risks,<br>they\u2019re more likely to follow the rules. They also use ideas from sociology to understand how the<br>culture of a workplace affects how people act. If a company cares about cybersecurity, the<br>employees will probably care too.<br>One example of social science in action is when specialists use surveys or focus groups to learn<br>what kind of training works best. This helps them create better programs that actually work in<br>real life. It shows how social science research is important for solving real problems in<br>cybersecurity.<br>Class Concepts That Fit This Career<\/p>\n\n\n\n<p>There are several ideas from class that connect directly to this job:<br>Human Factors \u2013 People are often the biggest weakness in cybersecurity. This job is all about<br>fixing that.<br>Social Engineering \u2013 Awareness training teaches people how to spot scams and tricks from<br>hackers.<br>Risk Communication \u2013 The job involves explaining dangers in a way people can understand.<br>CIA Triad \u2013 The work supports confidentiality, integrity, and availability by teaching smart<br>habits like strong passwords and being careful with emails.<br>These ideas are part of what we\u2019ve learned in class, and they are used every day by people in this<br>career.<br>Helping Marginalized Groups<br>Not everyone learns or understands technology the same way. That\u2019s why this career is<br>especially important for marginalized groups, like people who speak different languages, have<br>disabilities, or don\u2019t have a lot of experience with technology.<br>Here are some problems these groups face:<br>Language barriers \u2013 Some people can\u2019t understand the training if it\u2019s only in English.<br>Accessibility issues \u2013 Training videos or materials might not work well for people with vision or<br>hearing problems.<br>Lack of trust \u2013 Some communities don\u2019t trust government or company messages due to past<br>experiences.<br>Training specialists have to think about all these things and find ways to include everyone. That<br>might mean making videos with subtitles, writing in simpler language, or working directly with<br>community leaders to earn trust.<br>How the Job Helps Society<br>This job matters a lot to everyone in society. It\u2019s not just about helping one company. When<br>people know how to protect themselves, fewer cyberattacks happen. That means schools,<br>hospitals, banks, and more can run safely.<br>Cybersecurity Awareness and Training Specialists make a big impact by teaching people how to<br>be safe online. Their work supports public safety, national security, and helps protect people\u2019s<br>personal information. They also help people feel more confident using technology, which is<br>really important today since we use the internet for almost everything.<\/p>\n\n\n\n<p>Conclusion<br>Cybersecurity Awareness and Training Specialists do more than just talk about rules\u2014they help<br>people understand them and follow them. They use social science ideas, like how people think<br>and act, to create better training. They also make sure their programs include everyone,<br>especially people who might normally be left out. This career is a great example of how social<br>science and cybersecurity work together to keep people and information safe.<br>References<br>Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking. Wiley.<br>Wash, R. (2010). Folk models of home computer security. Proceedings of the Sixth Symposium<br>on Usable Privacy and Security.<br>Parsons, K., McCormac, A., Butavicius, M., &amp; Ferguson, L. (2019). Human factors and<br>information security: individual, culture and security environment. Australian Department of<br>Defence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 1 journal entry &#8220;Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas would appeal&nbsp;the most to you and which would appeal the least.&#8221; After checking out the NICE Workforce Framework, I think the areas that interest me the most are Analyze and Protect&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-knoepp\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29805,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/users\/29805"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages\/295\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/media?parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}