{"id":348,"date":"2025-02-01T18:39:33","date_gmt":"2025-02-01T18:39:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dblan023\/?page_id=348"},"modified":"2025-04-28T02:19:09","modified_gmt":"2025-04-28T02:19:09","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dblan023\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>Journal Entry #1<\/p>\n\n\n\n<p>With gifts in teaching, research, and analysis I saw many interesting and relative roles in the cybersecurity field. Though my cybersecurity coursework at ODU, I have learned that I love research cybersecurity articles related to national security and defense. A couple of the roles listed by the NICE workforce framework interest me and include Cyberspace Operations, Digital Forensics and Target Analysis. I included the Digital Forensics role as the description describes analyzing digital evidence and I love analysis and CSI! Areas that I find challenging in a cybersecurity position would be design such as the Secure Systems Development and Systems Requirement Planning roles. Although I understand and have studied NIST, I think the application of policies will be easier with cybersecurity work experience.<\/p>\n\n\n\n<p>Journal Entry #2<\/p>\n\n\n\n<p>Several principles of science apply to cybersecurity include Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, and Determinism.&nbsp; With technology use in all institutions, Relativism applies to cybersecurity as they all require protection from threats and vulnerabilities.&nbsp; Cybersecurity analysts must objectively(Objectivisim) analyze potential threats in their systems and cannot minimize to save costs.&nbsp; &nbsp;Cybersecurity must be simple enough for most people to understand which employs the concept of parsimony.&nbsp; Cybersecurity should use empiricism by testing all theories and devices to ensure that they work.&nbsp; When creating and employing cybersecurity measures, ethical neutrality must also be taken into consideration \u2013 Is it okay for the internet to save everyone\u2019s visit history?&nbsp; Finally determinism must be considered by evaluating why users do not abide by cyber hygiene guidelines.<\/p>\n\n\n\n<p>Journal Entry #3<\/p>\n\n\n\n<p>Privacyrights.org contains a number of resources that could be very useful for analysis by researchers. &nbsp; The Data Breach Chronology Page is one resource which identifies all breach notifications and organizes them in order with details regarding each breach. &nbsp;&nbsp;There is also a link to historical data which opens into a tableau page where data can be selected and visualized through graphs and charts. &nbsp;Trends and variations can be identified through data visualization. &nbsp;Different variables may be selected and contrasted across multiple states to help identify similarities and differences. &nbsp;Researchers can analyze the information to help keep our data safe and to also ensure that data captured is used ethically.&nbsp;<\/p>\n\n\n\n<p>Journal Entry #4<\/p>\n\n\n\n<p>Maslow\u2019s hierarchy of needs suggests that basic needs must be met first followed by psychological needs and then self-actualization.&nbsp; Cell phones and the internet have become nearly a physiological need.&nbsp; If I forget my phone, I become very worried and stressed.&nbsp; If the internet goes out, I become very stressed because it affects my work.&nbsp; Forgetting a cell phone can also affect safety needs due to google map dependence or the need to call someone when in danger.&nbsp; Having friends and followers on social media helps us meet the psychological need for belonging and love. The growth of social media has affected esteem as more friends and followers increase self-esteem. Many people self-actualize by having a business on social media. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Journal Entry #5<\/p>\n\n\n\n<p>My ranking of motives for cybercrimes is as follows:<\/p>\n\n\n\n<ol>\n<li>Money:&nbsp; Everybody needs money so this is very logical and many cybercriminals exploit for this purpose.<\/li>\n\n\n\n<li>Political:&nbsp; People are affected by politics, therefore cybercrime for political gain makes sense.&nbsp; People also like to get their way in life.<\/li>\n\n\n\n<li>Multiple reasons:&nbsp; Many factors drive individuals to various types of cybercrimes which include money, power, ego, revenge, etc.&nbsp;<\/li>\n\n\n\n<li>Revenge:&nbsp; Anger, pain, and jealousy are experienced by all and could lead to online revenge.<\/li>\n\n\n\n<li>Entertainment:&nbsp; I think most cybercriminals have a purpose, so this reason seems less logical.<\/li>\n\n\n\n<li>Boredom:&nbsp; Young people may experience boredom, but most have a purpose, so this seems less logical.<\/li>\n\n\n\n<li>Recognition:&nbsp; People do thrive for recognition, but I think most want popularity.<\/li>\n<\/ol>\n\n\n\n<p>Journal # 6<\/p>\n\n\n\n<p>Hackers often try to mimic popular websites such as Paypal, Apple, and more recently Bed, Bath, and Beyond with the recent closure.&nbsp; Fake websites may have nearly identical website design but a small difference in the domain name might be used such as paypail.com.&nbsp; One red flag to look for in a fake website is using the unsecure protocol \u201chttp\u201d instead of \u201chttps\u201d which provides security. &nbsp;In the past, I have accidentally put wwww.google.com in the web browser which led me to an unsecure site so hackers may try to manipulate accidental typos by users.&nbsp; Missing contact information and poor graphics are additional clues. Legitimate business websites typically provide contact information and shop policies.<\/p>\n\n\n\n<p>Journal #7<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"575\" src=\"https:\/\/sites.wp.odu.edu\/dblan023\/wp-content\/uploads\/sites\/36418\/2025\/04\/image-1.png\" alt=\"\" class=\"wp-image-412\" srcset=\"https:\/\/sites.wp.odu.edu\/dblan023\/wp-content\/uploads\/sites\/36418\/2025\/04\/image-1.png 850w, https:\/\/sites.wp.odu.edu\/dblan023\/wp-content\/uploads\/sites\/36418\/2025\/04\/image-1-300x203.png 300w, https:\/\/sites.wp.odu.edu\/dblan023\/wp-content\/uploads\/sites\/36418\/2025\/04\/image-1-768x520.png 768w, https:\/\/sites.wp.odu.edu\/dblan023\/wp-content\/uploads\/sites\/36418\/2025\/04\/image-1-443x300.png 443w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>In several of the photos (13 and 14), two people looking at the same computer screen.\u00a0 In photo 13, the father\/son duo are looking at the screen together without considering any potential cybersecurity threats as they trust each other.\u00a0 In photo 14, two people appear to be working together and looking at the same laptop. \u00a0\u00a0They also appear to trust each other as coworkers.\u00a0 These trust behaviors are learned, and may cause these individuals not to consider potential shoulder surfing in other situations like at a coffee shop.\u00a0 Even at work, coworkers should not be trusted with passwords.\u00a0 Photo 16 is a good example of someone working remotely with no potential threats.\u00a0<\/p>\n\n\n\n<p>Journal #8<\/p>\n\n\n\n<p>The video \u201cHacker Rates 12 Hacking Scenes in Movies and TV| How real is it?\u201d shows that movies can influence our understanding about cybersecurity in both positive and negative ways.\u00a0 Some of the movies provided an accurate portrayal of cybersecurity while others misrepresented cybersecurity.\u00a0 For example, in the movie \u201cWargames\u201d from 1983, the ease of locating passwords and hacking into accounts by login is a true representation of cybersecurity that can easily happen.\u00a0 The movie \u201cThe Fate of the Furious\u201d from 2017, was based on a real world hack, however, it is not very realistic today for a hacker to get into lots of makes and models of cars.\u00a0 Remotely turning on the ignition is not easy to do today, but as cars become more connected it could become more possible unless cybersecurity finds alternative solutions.<\/p>\n\n\n\n<p>Journal #9<\/p>\n\n\n\n<p>I scored a 0 on the social media scale which indicates I have a healthy use of social media.\u00a0 The problems listed in the scale appeared to measure a person\u2019s level of addiction to social media.\u00a0 I thought they were very relevant and could be helpful to struggling people.\u00a0 \u00a0Life in the USA today is social media based.\u00a0 While on a surfing retreat one spring, I noticed my \u201cfriend\u201d constantly staring at her facebook page while ignoring the people around her.<\/p>\n\n\n\n<p>Different patterns may be found around the world due to various reasons such as culture, lack of technology, and political limitations.&nbsp; Japan uses social media, but less than the USA as school and work are high priorities.&nbsp;<\/p>\n\n\n\n<p>Journal #10<\/p>\n\n\n\n<p>Social cybersecurity is an emerging field in the military and is different than traditional cybersecurity because humans rather than technology are the target. Social media can be used to create division between people, races, allies, and religions which can weaken a nation\u2019s military response when needed.\u00a0 After the War on Terrorism, the US military realized the need to shift from physical warfare to technology enabled warfare to influence people.\u00a0 Fake news in the individual hands of users is becoming a serious problem that is difficult to control without violating the freedom of speech. Multiple social-cyber maneuvers also exist that can influence a group or nation.\u00a0 For example, in Ukraine adult content-sharing accounts were created for young men and then pro-Russian rhetoric was injected into the group.\u00a0 It is crazy to think this is happening and will certainly make warfare dangerous and challenging.<\/p>\n\n\n\n<p>Journal #11<\/p>\n\n\n\n<p>A cybersecurity analyst is the first line of defense for the network and responds to<br>intrusion detection, phishing attacks, vulnerabilities, etc. They may also provide<br>education, engage in research, and place patches. The presenter mentioned that job<br>hours are 24\/7, which means cybersocial attackers also work around the clock. It is<br>important for cybersecurity analysts to educate as the user is the most important link to<br>a cyberattack which can often be prevented. Cybersecurity is in high demand as the<br>need for user awareness is huge according to the video. Attackers are always coming<br>up with new phishing emails and vishing messages. The analyst must also work with<br>cross-functional teams to investigate incidents and ensure security.<\/p>\n\n\n\n<p>Journal #12<\/p>\n\n\n\n<p>Two economic theories to consider for the sample breach notification reviewed include Rational choice theory and Laissez-fare economic theory.&nbsp; In Rational choice theory, businesses make choices that are in their best interest.&nbsp; Glass Washer Parts follows this theory by using a platform provider who works with a leading cybersecurity firm to remove the malware and also to monitor the platform and safeguard personal information.&nbsp; They also notify potentially affected clients about the breach with recommendations for personal information protection.&nbsp; The Laissez-fare economic theory does not believe in government intervention unless there is a need to protect a person\u2019s alienable rights.&nbsp; This is illustrated in the breach as the platform provider is cooperating with law enforcement.&nbsp; The company also had to wait to notify clients of the breach until law enforcement could investigate.<\/p>\n\n\n\n<p>Two social theories to consider for the sample breach notification reviewed includes Objectivity and Parsimony theory.\u00a0 In Objectivity, study and analysis takes place without any bias.\u00a0 For this breach, the company delays notifying their customers about the breach because they needed time to investigate and determine the extent of damage.\u00a0 This ensures they can give clients the most accurate information.\u00a0 In Parsimony, explanations are as simple as possible.\u00a0 This letter is very simple and clear so that all customers of various education levels can easily read and understand.<\/p>\n\n\n\n<p>Journal #13<\/p>\n\n\n\n<p>HackerOne data was researched to determine the benefits of a bug bounty company.\u00a0 Bug bounty advocates argue that they save money for businesses, especially those that may not be able to afford to find their own bugs.\u00a0 The findings of the research concur with their argument.\u00a0 Research found that hackers are motivated more by experience, reputation, and altruism than they are by money which makes the bug bounty companies affordable.\u00a0 The reputation and revenue of the company did not have an economically significant impact on reports received.\u00a0 Bug bounties are effective for companies of all sizes and there is a positive effect on revenue.\u00a0 Hackers did not work in healthcare and finance as much as in other industries, but this is most likely attributed to the fact that these industries must employ cybersecurity measures to protect highly personal data.<\/p>\n\n\n\n<p>Journal #14<\/p>\n\n\n\n<p>Andriy Slynchuk writes an interesting article regarding eleven things we do online that could be illegal. Five of the offenses struck me as serious: Using unofficial streaming services, sharing photos of others, using copyrighted images, and collecting information about children younger than 13. &nbsp;Most concerning, many people may participate in these activities without realizing they are considered illegal.&nbsp; Many people use unofficial streaming services because they are free, however, they are also an opportunity for threat actors to steal personal information.&nbsp; Although free, they are a violation of copyright laws.&nbsp; Many people also engage in photo sharing without asking for permission. &nbsp;&nbsp;Although acceptable in public locations, taking a picture of someone and posting on the internet is illegal in private locations.&nbsp;&nbsp; Most people take pictures of friends and share on social media in private places without asking permission.&nbsp; Permission should be asked as some people may be sensitive and it is certainly more polite to ask first.&nbsp; The use of copyrighted images is also quite common, and it is very easy to copy and paste an image from the internet anywhere.&nbsp; My team at work does this often for birthdays and even team projects, however, we should be providing a citation.&nbsp; Of course, collecting information about children younger than 13 is illegal and many internet marketing techniques targeted children until the Children\u2019s Online Privacy Protection Act was passed.&nbsp; This is very disturbing because data collected about children for marketing purposes could get into the wrong hands and potentially exploit children.&nbsp; Although parental consent may be obtained, I think parents should still be cautious due to security issues today.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Slynchuk, A. (2021, June 1)\u00a0 <em>11 Illegal Things You Unknowingly Do on the Internet<\/em>.\u00a0 Clario.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n\n\n\n<p>Journal #15<\/p>\n\n\n\n<p>The TED video with Davin Teo was very interesting to me as I think I would really like digital forensic investigation.\u00a0 He mainly provided the technological details considered in digital forensics, but he did mention that they often go into an investigation with legal counsel.\u00a0 He also mentioned that in the digital forensics they deal with emails containing death threats.\u00a0 This is a good example of the relationship between cybersecurity and criminology as the digital forensic investigator will need to understand criminological theory to better understand the criminal and victims.\u00a0 This is why cybersecurity professionals need to understand political science\/law because they often must relate to and speak the language of legal counsel.\u00a0 He has an interesting background and was an accountant by profession.\u00a0 An accounting practice wanted an accountant who could also help with IT which he had also tinkered with. He took the first digital forensics investigator position in Australia and found his passion.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry #1 With gifts in teaching, research, and analysis I saw many interesting and relative roles in the cybersecurity field. Though my cybersecurity coursework at ODU, I have learned that I love research cybersecurity articles related to national security and defense. A couple of the roles listed by the NICE workforce framework interest me&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dblan023\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":28627,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/pages\/348"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/users\/28627"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/pages\/348\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/pages\/348\/revisions\/413"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dblan023\/wp-json\/wp\/v2\/media?parent=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}