CYSE Journal Entries
Journal 1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
Note: Word count should be in between 100 -150 words. Upload all your journal entries into your ePortfolio and submit the link in the assignment.
The NICE Workforce Framework for Cybersecurity offers appealing areas for professionals,
including diverse work role categories like Oversight and Governance, Risk Management,
Incident Response, and Cyber Defense. These roles allow for specialization and career
advancement. I would have to say that the well rounded aspect, although amazing, is my least
favorite aspect. Overall I don’t have many negatives surrounding this framework. Continuous
learning and development are encouraged, ensuring professionals stay updated with the latest
trends and technologies. Overall, the framework provides a structured approach to developing a
skilled and resilient cybersecurity workforce.
Journal 2
Explain how the principles of science relate to cybersecurity.
Note: Upload your journal entry into your ePortfolio and submit the link in the assignment.
The principles of science play a pivotal role in the field of cybersecurity, guiding the
development, implementation, and evaluation of security measures. One of the core scientific
principles is the scientific method, which involves observation, experimentation, and hypothesis
testing. In cybersecurity, this translates to continuous monitoring of systems, conducting
penetration tests to identify vulnerabilities, and developing theories about potential threats and
attack vectors.The principle of cause and effect is also significant in cybersecurity.
Understanding the relationship between actions and outcomes enables experts to trace the
origins of cyber-attacks, identify weaknesses in systems, and implement corrective measures.
In summary, the principles of science provide a structured, evidence-based approach to
cybersecurity, developing continuous improvement, adaptability, and resilience against evolving
threats.
Journal 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
Note: Upload your journal entry into your ePortfolio and submit the link in the assignment.
Researchers use publicly available information from data breaches to gain insights into the
methods, patterns, and impacts of cyber crimes. By analyzing leaked data, they identify
common vulnerabilities exploited by cybercriminals, assess the effectiveness of security
measures, and understand the scale of breaches. These studies contribute to the development
of stronger cybersecurity practices and policies. Researchers often work with industry experts,
government agencies, and academic institutions to share findings and improve collective
knowledge on preventing future breaches. The ultimate goal is to enhance overall data
protection and minimize the risks associated with cyber threats.
Journal 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Note: Upload your journal entry into your ePortfolio and submit the link in the assignment.
Physiological Needs: These are the basic needs for survival, such as food, water, and shelter. In the digital age, technology helps meet these needs through online grocery shopping, food delivery apps, and smart home devices that control heating and lighting.
Example: Using a food delivery app like Uber Eats to order a meal when I’m unable to cook or go out to eat.
Safety Needs: This level includes the need for security and protection. Technology provides various tools for safety, such as antivirus software, encrypted messaging apps, and online banking security features.
Example: Using a secure password manager to keep your online accounts safe from hackers. I personally use VPN’s in conjunction with firewalls and antivirus for my PC and phone.
Love and Belonging Needs: These needs involve emotional relationships and connections with others. Social media platforms, messaging apps, and online communities help fulfill these needs by allowing people to stay connected with friends, family, and like-minded individuals.
Example: Using Instagram or facebook to stay in touch with family members who live far away or joining discord servers with new people I choose to game with .
Esteem Needs: This level includes the need for self-esteem, recognition, and respect from others. Digital experiences that provide opportunities for achievement and recognition can help meet these needs.
Example: Receiving positive feedback and likes on a LinkedIn post about a professional achievement, or simply receiving likes on facebook about my day- day victories or updates, boosting my confidence and sense of accomplishment.
Self-Actualization: The highest level involves realizing one’s full potential and pursuing personal growth and creativity. Technology can facilitate self-actualization through online courses, creative tools, and platforms for sharing your work with the world.
Example: Enrolling in an online course such as this one to learn a new skill or using a digital art app to create and share your artwork with others.
Journal 5
Review the articles linked with each individual motive in the presentation page or Slide #3. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
If I had to rank motives to commit cyber crimes I would list them as such:
Ranking Motives to Commit Cyber Crimes:
- Multiple Reasons: Most attackers have more than one grievance leading them to commit cyber crimes. Every motive listed below plays a role in their decision-making process.
- Political: Given the current volatile political climate, this ranks high. The division and hatred prevalent today can drive potential attackers to act on emotion rather than facts, targeting those they wish to attack or expose.
- Revenge: Human nature makes revenge a top motive. Just as children are often taught to retaliate when wronged, individuals may seek retribution through cyber attacks if they feel they’ve been wronged.
- Financial Gain: Ironically, this motive is the most ethically and morally grounded. For some attackers, cyber crime may be the easiest or only way to make money and fulfill their responsibilities and pay their bills.
- Recognition: Some cyber terrorist groups commit these acts to gain recognition, akin to a virtual Robin Hood. They often publicize their attacks and challenge authorities to catch them. Unlike in movies, they rarely get caught.
- Entertainment: While less logical, some may commit cyber crimes for the thrill or a quick dopamine boost. However, other motives seem more logical and compelling to me.
- Boredom: Ranked last, it’s hard to understand how anyone could commit cyber crimes out of sheer boredom. It seems something more substantial would have to drive them to invest the time and effort required.
Journal 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?
Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.
As someone who has designed and created websites before and has sat through all manor of cyber security training both for education as well as occupation, I think there are a few tells that can spot out a fake website.
I think the easiest way to spot a fake website lies within the address bar. The URL may have slight variations or extra characters compared to the legitimate site. Additionally there’s no “HTTPS” as a precursor indication the lack of a secure connection. Lastly, the lack of contact information on a website would clearly indicate a level of concern for me. Any website you go to that is deemed legit would have some sort of personal information with an address, email, or physical location attached. Most fake websites don’t go too in depth with their design thus forgetting that small yet important detail.
Journal 7
Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s).Explain how your memes relate to Human Systems Integration.
The meme I created relates back to Human systems Integration by addressing the importance of stress management. My picture showcases a man enjoying the views of the city whilst working on his laptop. The fresh air paired with taking in the view could greatly lower his stress levels while working. My meme addresses the fact that while he is outdoors he’s still connected and obligated to complete his work. Personally I’d much rather complete my work outside rather than being stuck in a room office or building.

Journal 8
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
I think the media influences our understanding of cybersecurity by raising awareness of what’s happening on the internet but also influences behaviors of change. With its global reach , the media can let everyone know what type of cybercrime occured and how you can protect yourself against it. Overall, the media’s influence on our understanding of cybersecurity is a double-edged sword. While it raises awareness and educates the public, it can also contribute to misconceptions and fear. It’s important for consumers of media to critically evaluate the information they receive and seek out accurate, context-rich sources to develop a more nuanced understanding of cybersecurity.
Journal 9
Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
Out of the 9 criteria listed i answered yes to only 3. I think the items within the scale are very applicative to most in today’s day and age. Maybe a little more geared to those with a more adolescent way of living though, especially when it came to the bits about lying to your parents and friends about your social media usage. I think that different patterns are found throughout the world because each part of the world is vastly different. Even within the same state their can be hundreds of differences. I could only imagine the vast possibilities from between people from opposite sides of the world. There could be influences from, different political climates, economic climates, and cultural differences that could play apart in how someone utilizes social media. Speaking from my experience only as an AMerican citizen, we tend to overshare way too much on the internet.
Journal 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity
AS someone who is currently active duty Air Force, this topic has been strongly engraved in my mind. As the years progressed, we have seen in advancements in all forms of technology which has paved a way for the increase in ability to connect with people anywhere in the world. Everyday there is new information being spread all over the net by “influencers” or various AI that can either help or hurt a general populous. I think this article perfectly encapsulates the idea that you don’t need an all out crippling military attack to weaken a nation. If you can get the country’s citizens to attack its own by lue of misinformation, the same effect still happens. When it comes to the USA we pride ourselves on freedom above all. We are a melting pot of different ethnicities and cultures after all. All of us have different morals and values that guide our life. Our enemies use this thought againsts us by poking and prodding our policies and beliefs and pinning those who have differing beliefs against one another. As we have seen that leads to all manors of protests and backlash of the american people. This is to the advantage of those who wish to make us weak by distracting our government into dealing with our domestic affairs instead of our international affairs. I truly enjoyed this article because I have a part to play in defending against this use of social cybersecurity.
Journal 11
Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site.
, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
Cybersecurity analyst utilize a few different social behaviors such as : promoting awareness, collaborative problem solving, and behavioral analysis.Becoming a cybersecurity analyst often involves engaging with social themes such as trust, communication, and awareness. Analysts must address the challenge of fostering trust among colleagues and organizations, ensuring that security measures are accepted and adopted. They also engage in extensive collaboration, relying on effective communication to translate complex technical concepts into actionable advice for non-technical stakeholders. Another critical theme is raising awareness about cybersecurity risks and educating others about safe practices, which requires understanding human behavior and influencing social norms. Additionally, aspiring analysts navigate ethical considerations, such as balancing security measures with privacy concerns, showcasing the interplay between societal values and cybersecurity responsibilities. These social themes highlight the importance of interpersonal and societal dynamics in the profession.
Journal 12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
The cost-benefit analysis theory helps explain the company’s decision-making process in responding to a data breach. For example, the company weighs the costs of notifying customers, offering credit monitoring, and implementing stronger security measures against the potential financial and reputational damage of not taking action. Additionally the information asymmetry theory proves that the company has more information about the breach than the customers initially do. The data breach letter serves to reduce this asymmetry by informing customers about what happened and what steps are being taken.
These economic theories relate to the social science theories of trust (trust theory) and the social contract theory. A data breach can erode trust between a company and its customers. The letter aims to rebuild this trust by demonstrating transparency, accountability, and a commitment to rectifying the issue. That goes hand in hand with the social contract theory that suggests that companies have a moral obligation to protect customer data as part of an implicit social contract. A breach letter acknowledges this responsibility and outlines steps to uphold it.