CYSE 201S

Journal #1

The NICE Workforce Framework is a in depth resource developed by the National Initiative for Cybersecurity Education (NICE) that outlines categories and specialty areas relevant to cybersecurity careers.

This includes:

  1. Securely Provision
  2. Operate and Maintain
  3. Protect and Defend
  4. Analyze
  5. Operate and Collect
  6. Investigate
  7. Oversee and Govern

The areas that appeal most include the Analysis category which involves deep analysis of cybersecurity data; focusing on understanding threats and vulnerabilities through activities like incident response, malware analysis, and security intelligence. I enjoy problem-solving and uncovering patterns or anomalies, which makes this area appealing to me. Protect and Defend entails designing and implementing security measures to safeguard systems, networks, and data. Which includes roles like penetration testing, firewall management, and secure software development. I find myself to be passionate about preventing cyber threats and staying updated with security technologies, which is why this area excites me. Securely Provision emphasizes integrating cybersecurity into systems and software development, covering roles like system architecture, software development security, and secure configuration management. I have a profound interest in building secure systems and mitigating risks during development, which is why this area is a good match.

Areas that appeal least to me would include Operate and Maintain which encompasses the daily operation and upkeep of cybersecurity systems and tools involving essential tasks like patching, monitoring, and maintaining security infrastructure. This role, while crucial for ensuring ongoing security, is less appealing to me as I prefer more dynamic and strategic positions. Oversee and Govern pertains to managing and leading cybersecurity programs and policies including but limited to roles in cybersecurity management, risk management, and legal compliance. I tend to lean towards hands-on technical work rather than managerial or administrative tasks, this area feels less attractive. Investigate involves cyber-related investigations and digital forensics to detect and respond to security incidents, such as digital forensics analysis, cyber investigations, and threat hunting. I happen to prefer proactive security work over reactive incident response, making this category a lower priority to me personally.

Journal #2

The principles of social science intersect with cybersecurity in several critical ways. First, social science concepts such as human behavior, decision-making, and organizational dynamics are fundamental in understanding cybersecurity threats. Many cyber incidents result from human error, manipulation, or exploitation of social vulnerabilities rather than purely technical flaws. Social science research informs cybersecurity strategies by shedding light on how individuals and groups perceive risk, comply with security protocols, and respond to cyber threats. Moreover, social factors like cultural norms and economic incentives influence cybercrime patterns and impact cybersecurity policy development. Therefore, integrating social science principles into cybersecurity frameworks enhances our ability to design effective strategies that address the human aspects of cybersecurity challenges and foster a more comprehensive approach to cyber defense.

Journal #3

Exploring PrivacyRights.org and the publicly available information on data breaches provides valuable insights for researchers studying cybersecurity incidents. By accessing this repository of breach data, researchers can analyze trends, patterns, and characteristics of different breaches over time. They can examine details such as the types of data compromised, the industries affected, the methods of attack, and the scale of impact. This information enables researchers to identify common vulnerabilities, assess the effectiveness of security measures, and develop strategies for mitigating future breaches. Additionally, researchers can use this data to understand the economic, legal, and social implications of breaches, informing policy recommendations and advancing the field of cybersecurity. Overall, platforms like PrivacyRights.org serve as essential resources for researchers seeking to deepen their understanding of data breaches and enhance cybersecurity practices.

Journal #4

Maslow’s Hierarchy of Needs provides a fascinating lens through which to examine the role of technology in my life, touching on various levels of human needs from basic to self-actualization.

Starting at the foundational level of physiological needs, technology plays a crucial role in meeting these requirements. For instance, access to reliable internet and digital devices ensures I can meet my need for basic communication, information, and even sustenance (like ordering groceries online). These technologies have become essential for maintaining my physical well-being and survival in modern society.

Moving up to safety needs, technology contributes significantly by enhancing personal and data security. Utilizing password managers and encrypted communication apps helps protect my personal information and financial transactions, satisfying my need for safety and security in the digital realm.

The level of belongingness and love is also impacted by technology. Social media platforms and messaging apps enable me to connect with friends, family, and communities, fostering relationships and a sense of belonging. These digital connections supplement and sometimes substitute for in-person interactions, fulfilling my need for social connection.

Regarding esteem needs, technology has a dual effect. On one hand, achievements in the digital space (such as gaining followers, receiving likes, or completing challenges in games) can boost self-esteem. On the other hand, the pervasive nature of social comparison and the pressure to present an idealized online self can sometimes undermine self-esteem, highlighting the complex interplay between technology and self-worth.

Finally, self-actualization and transcendence are influenced by technology through access to educational resources, creative tools, and opportunities for personal growth. Online courses, creative software, and platforms for sharing ideas empower individuals to pursue their passions, express themselves, and contribute to society in meaningful ways.

Journal #5

  1. For money (Rank 1): This motive makes the most sense as it aligns with a tangible and direct benefit. Many cybercriminal activities, such as phishing, ransomware attacks, and identity theft, are driven by financial gain.
  2. Recognition (Rank 2): Seeking recognition or notoriety can motivate individuals to engage in cybercrime, such as hacking into high-profile systems to gain attention or prove technical prowess.
  3. Entertainment (Rank 3): Engaging in cybercrime for entertainment purposes, such as hacking games or systems out of curiosity or thrill-seeking, is a relatively common but less financially motivated motive.
  4. Revenge (Rank 4): Cybercrime driven by revenge, such as hacking into an ex-partner’s social media account, can occur but is typically more personal and less widespread than financially motivated cybercrimes.
  5. Multiple reasons (Rank 5): Some individuals may have mixed motives for cybercrime, including a combination of financial gain, revenge, recognition, or other factors.
  6. Political (Rank 6): Engaging in cybercrime for political motives, such as cyberattacks on government or organizational websites for ideological reasons, is less common for individual actors and often associated with state-sponsored or organized group activities.
  7. Boredom (Rank 7): While boredom can lead to engaging in cyber activities, it is generally considered the least sensible motive for cybercrime as it lacks clear purpose or meaningful outcomes beyond temporary diversion.

Journal #6

Spotting fake websites is crucial for maintaining online security and avoiding scams. Here’s how I differentiate between fake and real websites based on key indicators:

  1. URL and Domain Name:
    • Real Website: A legitimate website will have a domain name that matches the organization’s name or purpose. For example, www.apple.com for Apple Inc.
    • Fake Website: Fake websites often use URLs that mimic popular brands but with slight variations or extra words. For instance, www.appllestore.com instead of www.apple.com.
  2. Design and Layout:
    • Real Website: Legitimate websites usually have a professional and well-designed layout, with consistent branding, clear navigation menus, and high-quality images.
    • Fake Website: Fake websites may appear sloppy or unprofessional, with low-resolution images, spelling errors, and inconsistent design elements.
  3. Security Indicators:
    • Real Website: Trusted websites use HTTPS encryption, indicated by a padlock icon in the browser’s address bar. They also display privacy policies and contact information.
    • Fake Website: Fake websites may lack HTTPS encryption, and their privacy policies or contact details may be missing or seem vague.

Journal #7

This meme depicting someone stealing information through a fake network highlights the human aspect of cybersecurity. It illustrates how attackers use deception and social engineering to exploit human trust and vulnerabilities. Human-centered cybersecurity emphasizes educating users about common tactics like phishing and fostering a security-aware culture. It also emphasizes designing intuitive security measures that align with human behavior to promote safer online practices and risk assessment. By understanding human behavior and perceptions, cybersecurity strategies can effectively address the complexities of online threats.

This meme about winning a new iPhone through a fraudulent link illustrates how cyber attackers exploit human emotions and trust to deceive people. It highlights the importance of user awareness and education in cybersecurity to recognize and avoid such deceptive tactics. Human-centered cybersecurity focuses on understanding human behavior and designing security measures that consider human vulnerabilities, ultimately promoting safer online practices and risk mitigation.

This meme about someone gathering money through a fake cause highlights how cyber attackers manipulate human emotions and trust for fraudulent purposes. It emphasizes the importance of user awareness and education in cybersecurity to recognize and question suspicious online appeals. Human-centered cybersecurity aims to empower individuals to protect themselves against deception and exploitation by promoting critical thinking and ethical online practices.

Journal #8

The media plays a significant role in shaping our understanding of cybersecurity, often influencing how we perceive threats, risks, and the importance of online security. Through news articles, TV shows, movies, and online content, the media can both educate and sometimes sensationalize cybersecurity issues.

Firstly, the media helps raise awareness about cybersecurity by reporting on major data breaches, cyberattacks, and emerging threats. This coverage can inform the public about potential risks and encourage individuals and organizations to take proactive security measures.However, the media can also sometimes sensationalize cybersecurity incidents, portraying hackers as mysterious and highly skilled individuals capable of causing widespread chaos. While these depictions can be entertaining, they may also create misconceptions about the nature of cyber threats and the capabilities of cybercriminals.

Additionally, media portrayals often focus on dramatic or extreme cyber incidents, such as large-scale ransomware attacks or high-profile data breaches. While these incidents are undoubtedly important to report on, they may overshadow more common cybersecurity issues faced by everyday users, such as phishing scams or weak password security.It’s essential to consume media coverage of cybersecurity with a critical eye, seeking balanced and accurate information. By understanding how the media shapes our perceptions, we can better navigate the complexities of cybersecurity and make informed decisions to protect ourselves online. Ultimately, the media’s role in cybersecurity underscores the need for ongoing education, awareness, and responsible reporting to promote a more nuanced understanding of digital security in today’s interconnected world.

Journal #9

The Social Media Disorder scale items cover various aspects related to problematic social media use, including preoccupation, tolerance, withdrawal, persistence, displacement, problems, deception, escape, and conflict. Each item reflects different behaviors and consequences associated with excessive or addictive use of social media platforms.

Regarding answering “yes” to only escape and achieving a score of 1 out of 9, this suggests I have a focus on the behavior of using social media solely as a means of escape from other activities or emotions. This behavior could indicate a potential issue with using social media as a coping mechanism rather than engaging with real-life situations or emotions but does not mean I have a disorder.

Reflecting on the scale’s items, they provide a comprehensive view of the potential negative impacts of excessive social media use. Preoccupation refers to constant thoughts about social media, while tolerance suggests needing more time online to achieve the same satisfaction. Withdrawal indicates discomfort or distress when unable to access social media, and persistence refers to continued use despite negative consequences. Displacement refers to neglecting other important activities due to social media use, and problems highlight the adverse effects on relationships or daily functioning.Deception involves hiding the extent of social media use from others, and escape suggests using social media as a way to avoid real-life responsibilities or emotions. Conflict indicates interpersonal or internal struggles resulting from social media use.

Different patterns of problematic social media use across the world can be influenced by various factors, including cultural norms, technology accessibility, societal expectations, and individual psychological characteristics. Cultural attitudes towards technology, social interactions, and mental health play roles in shaping how social media use is perceived and managed globally. Additionally, differences in access to resources, such as mental health services or digital literacy programs, can contribute to varying patterns of problematic social media use across different regions or populations. Understanding these factors is essential for developing effective interventions and support systems to address social media-related issues worldwide.

Journal #10

Today, I explored an article on social cybersecurity, delving into the complexities and implications of how societal and cultural factors intersect with cybersecurity practices. The article highlighted how different patterns of problematic social media use can be influenced by cultural norms, technology accessibility, societal expectations, and individual psychological characteristics. It emphasized the importance of understanding these factors to develop effective interventions and support systems that address social media-related issues globally.

Reflecting on my response to the article, I recognize the significance of cultural attitudes towards technology and social interactions in shaping behaviors around social media use. The concept of social media disorder, as discussed in the article, encompasses various problematic behaviors such as preoccupation, withdrawal, and deception, all of which can impact individuals’ well-being and relationships.

Furthermore, the article prompted me to consider how societal norms and digital literacy levels impact the way individuals navigate the digital landscape and manage their online behaviors. It underscores the need for holistic approaches to cybersecurity that not only focus on technical aspects but also consider human factors and socio-cultural contexts.

Overall, exploring this article has broadened my understanding of social cybersecurity and highlighted the importance of interdisciplinary perspectives in addressing the evolving challenges of digital connectivity in our interconnected world.

Journal #11

The description of the cybersecurity analyst job inherently relates to social behaviors as it involves addressing and mitigating risks arising from human actions and interactions within digital environments. Several social themes emerge in this context. First, the job underscores the importance of understanding human behavior and motivations behind cyber threats, such as phishing or social engineering tactics. It involves analyzing patterns of behavior to identify vulnerabilities and anticipate potential risks. Additionally, the role emphasizes collaboration and communication skills to interact effectively with stakeholders and colleagues in addressing cybersecurity challenges. Social themes like trust, accountability, and transparency are crucial in this role, as cybersecurity analysts work to build secure digital ecosystems that promote confidence and reliability among users. Furthermore, the job requires awareness of evolving social norms and practices in online communities to adapt strategies for protecting sensitive information and combating emerging threats. Overall, the cybersecurity analyst role intersects with various social dynamics, highlighting the interconnectedness between technology and human behavior in shaping cybersecurity strategies and outcomes.

Journal #12

Economic Theories:

Game Theory: Game theory analyzes strategic interactions among stakeholders in a data breach incident, predicting decisions based on incentives and outcomes. It helps understand responses from affected individuals (e.g., lawsuits, changing providers) and guides the company’s response (e.g., compensation, security enhancements).

Cost-Benefit Analysis: This theory assesses the financial impact of a data breach, weighing costs (e.g., remediation, legal fees) against benefits of preventive measures. It informs resource allocation and cybersecurity investments based on economic outcomes.

Social Science Theories:

Social Learning Theory: Explains how individuals and organizations learn from data breach experiences to improve cybersecurity practices by observing and imitating others. Emphasizes sharing knowledge and best practices in a social context.

Crisis Communication Theory: Guides organizations in communicating during a data breach crisis, managing public perception, building trust, and providing transparent information to minimize reputational damage and maintain stakeholder relationships.

Journal #13

I explored the use of bug bounty policies in cybersecurity, as discussed in the article titled “Hacker-Powered Security: A Review and the Metrics that Matter.” The article provides a comprehensive literature review and discussion of findings related to bug bounty programs, which incentivize individuals, often ethical hackers, to identify vulnerabilities in a company’s cyber infrastructure. These policies are grounded in economic principles of cost-benefit analysis, aiming to balance the costs of potential cyber threats against the benefits of proactive vulnerability discovery and mitigation.

The literature review highlights the evolution of bug bounty programs and their effectiveness in enhancing cybersecurity posture by leveraging external expertise to identify and address vulnerabilities. Ethical hackers, through penetration testing, play a crucial role in uncovering weaknesses that may otherwise go undetected, contributing to overall cyber resilience. The discussion of findings underscores the importance of metrics in evaluating bug bounty program outcomes, such as vulnerability severity, exploitability, and organizational responsiveness.

Overall, the article emphasizes the growing adoption and impact of bug bounty policies within cybersecurity frameworks, highlighting their alignment with economic principles and the need for robust evaluation metrics to measure program effectiveness. This exploration underscores the innovative approaches to cybersecurity policy that integrate insights from economics and technology, leveraging external expertise to strengthen cyber defenses and mitigate evolving threats.

Journal #14

Andriy Slynchuk’s overview of potentially illegal actions committed by Internet users highlights several serious violations that can have significant legal and societal implications. Among these, copyright infringement ranks prominently as it involves the unauthorized sharing or distribution of copyrighted material, depriving creators of rightful earnings and subjecting offenders to substantial penalties. Cyberbullying and online harassment are equally concerning, as they can inflict severe emotional and psychological harm on victims and may lead to legal consequences under harassment laws. Identity theft or fraud, involving the unauthorized use of personal information for financial gain, poses serious risks to individuals and can result in profound financial and reputational damage. Additionally, engaging in or distributing child exploitation materials or pornography is not only illegal but morally reprehensible, causing harm to vulnerable individuals and carrying severe criminal penalties. Finally, hacking or unauthorized access to computer systems represents a significant cybersecurity breach that can result in criminal charges and extensive damage to individuals or organizations. These offenses are deemed serious due to their potential to cause harm, violate rights, and disrupt societal norms, emphasizing the importance of upholding legal and ethical standards in online behavior to foster a safe and respectful digital environment.

Journal #15

Today, I reflected on the career pathway of a digital forensics investigator and considered its connection to the social sciences. Digital forensics is a field that involves collecting and analyzing digital evidence to solve crimes or investigate cybersecurity incidents. The speaker’s pathway to this career likely involved a blend of technical expertise, problem-solving skills, and an understanding of human behavior, which are foundational aspects of the social sciences.

From the perspective of social sciences, digital forensics investigators must comprehend how individuals interact with technology, how behaviors manifest in digital environments, and how societal norms and contexts influence digital evidence. The speaker’s journey likely included studying psychology, sociology, criminology, or related disciplines to gain insights into human behavior and societal dynamics.

Furthermore, the speaker’s pathway may have involved developing skills in communication, collaboration, and critical thinking, all of which are essential in digital forensics investigations. Understanding the motivations and intentions behind digital activities requires a nuanced understanding of human psychology and societal influences.

Overall, the career of a digital forensics investigator aligns with the principles of the social sciences by integrating technical expertise with insights into human behavior and societal contexts. It underscores the interdisciplinary nature of cybersecurity and forensic investigations, emphasizing the importance of holistic approaches that consider both technological and social dimensions in solving complex digital crimes and security challenges.

Article Review #2

“Cyberattacks, cyber threats, and attitudes toward cybersecurity policies” by Karen L G Snider from Journal of Cybersecurity  

https://academic.oup.com/cybersecurity/article/7/1/tyab019/6382745?searchresult=1#406984045

Article Review by: Dane Bodmer 

  • How “Cyberattacks, cyber threats, and attitudes toward cybersecurity policies” relates to the principles of social science: 

1.This article represents social constructivism in the context of attitudes toward cybersecurity and policies that can be influenced by perceptions of risk, trust in institutions, and cultural norms dealing with technological use. Social constructivism emphasizes the importance of understanding how societal beliefs and standards shape individuals’ attitudes and behaviors towards cybersecurity.  

2.Social psychology in the context of cybersecurity is represented by individual attitudes toward cybersecurity policies that can be influenced by psychological factors such as perceived vulnerability, severity of cyber threats, efficacy of security measures, and social influence from peers or influential figures. 

3. Cybersecurity policies intersect with political science as they involve decision-making processes within governmental bodies and international organizations. Political factors such as power dynamics, competing interests, and political agendas can influence the formulation, implementation, and enforcement of cybersecurity policies. Cybersecurity issues often have geopolitical implications, as seen in debates over cyber espionage, cyber warfare, and international cooperation on cybersecurity. 

  • Study’s research question or hypothesis: 

There were three different hypotheses throughout “Cyberattacks, cyber threats, and attitudes toward cybersecurity policies” from the Journal of Cybersecurity.  

Hypothesis 1: “Exposure to (i) lethal or (ii) nonlethal cyberattacks will lead to greater support for adopting cybersecurity policies compared with people who were not exposed to any cyberattack. In other words, exposure to cyberattacks—lethal (LC) or nonlethal (NLC)—will increase support for adopting cybersecurity policies, as compared with a control group.” Hypothesis number one implicates that firsthand experience with cyberattacks at any level of severity will lead individuals to recognize the importance of cybersecurity and be more supportive of policies aimed at addressing cyber threats. Implying that experiencing a cyberattack serves as a stimulating event for prioritizing cybersecurity and advocating for measures to mitigate future risks.  

Hypothesis 2: “People who are exposed to lethal cyberattacks (LC) will exhibit to higher support for adopting cybersecurity policies than people who are exposed to nonlethal cyberattacks (NLC).” The second hypothesis suggests that individuals who have experienced cyberattacks with a high level of severity will demonstrate greater support for adopting cyber policies compared to those who have endured less severe cyberattacks. Insinuating that the lethality of the cyberattack may play a significant role in shaping an individual’s perceptions of the importance of cybersecurity measures and their support towards policies aimed at mitigating future cyberattacks. 

Hypothesis 3: “Cyber threat perception will mediate the relationship between individual exposure to cyberattacks and support for cybersecurity policies.” Hypothesis number three introduces the idea that individuals who have been introduced to cyberattacks are more likely to support cybersecurity policies, but this relationship is affected by their perceptions of cyber threats. Higher levels of exposure to cyberattacks may lead to heightened cyber threat perception which will only increase support for cybersecurity policies. Suggesting how a person subjectively views the seriousness and timeliness of a cyber threat, plays a role in how they feel towards cyber policies and measures. 

  • Types of research methods used: 

This article used the Experimental Method. The experimental method is a scientific research approach used to analyze cause-and-effect relationships between variables in a controlled setting. By manipulating one or more independent variables, scientists can observe their effects on a dependent variable while controlling other factors that could influence the outcomes. These components are generally what the Experimental Method is derived from:  

  1. Variables: Researchers identify independent and dependent variables. 
  1. Design: Plan the experiment to test hypotheses by changing independent variables and measuring dependent variables. 
  1. Random Assignment: Participants are randomly assigned to experimental groups to ensure fairness. 
  1. Control Group: A baseline group is included to compare against experimental groups. 
  1. Procedure: Researchers conduct the experiment following a specific protocol. 
  1. Data Collection: They collect valid and reliable data on dependent variables. 
  1. Analysis: Data is analyzed to determine significant differences between groups. 
  1. Interpretation: Findings are interpreted to draw conclusions about cause-and-effect relationships. 
  • Types of data and analysis done: 

In the study “Cyberattacks, cyber threats, and attitudes toward cybersecurity policies” by Karen L G Snider, the researchers used various types of data and analyses to investigate the relationship between exposure to cyberattacks, threat perception, and support for cybersecurity policies. Here’s a breakdown of the data types and analyses used: 

Data:  

Survey Data: Data collected via surveys to measure a participant’s feelings toward cybersecurity policies, threat perceptions, and demographic information. 

Manipulation Check Data: Data acquired to ensure that the conditions of the experiment (exposure to different types of cyberattacks) produce different attitudes toward cybersecurity policies. 

Analysis: 

One-Way Univariate Analysis of Variance: This analysis was conducted to test the variance between the treatment groups (exposure to different types of cyberattacks) regarding attitudes toward cybersecurity policies. The dependent variables were different dimensions of cybersecurity policies. Significant differences were found in support for cybersecurity alerts between the groups. 

Pairwise Comparisons with Bonferroni Corrections: Following the ANOVA analysis, pairwise comparisons were conducted to further examine differences in support for cybersecurity alerts between the groups exposed to different types of cyberattacks. 

Path Analysis Model: A structural equation modeling approach with observed indicators only used to test mediation effects. The model included pathways from exposure to cyberattacks (lethal vs. nonlethal) to support cybersecurity policies, with threat perception as a mediator. 

Integrative Path Analysis Model: This model was constructed to identify direct and indirect effects among all study variables. It allowed the researchers to examine the relationships between exposure to cyberattacks, threat perception, and support for cybersecurity policies comprehensively. 

Indirect Effects Analysis: Indirect effects of exposure to cyberattacks on support for cybersecurity policies through threat perception were analyzed. Six mediation pathways were tested. 

  • Four concepts from class that relate to the article: 
  1. Risk Perception: Throughout this class I have learned about how an individual will perceive and evaluate risks from cyber threats and attacks. The article examines how exposure to cyberattacks influences attitudes toward cybersecurity policies, which is closely related to how individuals perceive the risks associated with cyber threats. 
  1. Public Policy and Governance: The article focuses on different people’s attitudes toward cybersecurity policies, which are a part of public policy and governance measures aimed at addressing cyber threats. During 201S we have studied how policies have been formulated, implemented, and evaluated in response to cybersecurity challenges which aligns perfectly with the research conducted in the article. 
  1. Human Behavior and Decision-Making: Understanding human behavior and decision-making processes is viatl in the cybersecurity field, as human error can affect the security of systems and data. The article investigates how being exposed to cyberattacks can impact an individual’s support for cybersecurity policies, bringing to light the relationship between human behavior and responses to cybersecurity threats. 
  1. Social Influence and Communication: Social influence and communication play significant roles in shaping one’s attitude and behavior toward cybersecurity. The article examines how exposure to cyberattacks influences attitudes toward cybersecurity policies, which can be influenced by many factors. 
  • Two different marginalized groups with potential concerns on the topic: 
  1. Economic and Social Marginalization: Economically marginalized groups may face greater vulnerability to cyberattacks and may lack resources to push for effective cybersecurity policies, potentially worsening their marginalization. 
  1. Racial and Ethnic Minorities: Minorities may face unique cybersecurity challenges due to systemic inequalities, which could influence their attitudes toward cybersecurity policies based on their experiences with discrimination and trust in institutions. 
  • Two societal contributions:  
  1. Informed Policy Decisions: The research provides important research into how being exposed to a cyberattack influences attitudes toward security policies. Policymakers can use these findings to make informed decisions when constructing and implementing cybersecurity policies. By understanding how individuals perceive and respond to cyber threats, policymakers can develop strategies that are more effective in acknowledging the needs and concerns of the population. 
  1. Public Awareness and Education: The study contributes to public awareness and education regarding cybersecurity issues. By examining the relationship between cyberattacks, threat perception, and support for cybersecurity policies. The research shows how important cybersecurity measures are in safeguarding individuals and organizations against digital threats. This increased awareness can empower individuals to take steps toward protecting themselves online and push for stronger cybersecurity measures in their communities and workplaces.