Journal entry #1
The categories from the NICE workforce framework that I would want to force on for my carrer is the investigation area. The investigation area has specialties that “investigates cybersecurity events or crimes related to information technology systems, networks, and digital evidence. I find both the specialty areas of cyber investigation and digital forensics very intersting and as something I could do for my carrer. The area that appeals least to me is the Analyze category. It includes specity areas like All-Source Analysis and Threat Analysis. I find these areas less inersesting.
Journal entry #2
The principles of relativism, objectivity, parsimony, skepticism, ethical neutrality, and determinism all play important roles in the field of cybersecurity. Relativism seesthat different stakeholders may have different perspectives on what constitutes a security risk or valuable asset. Objectivity ensures that cybersecurity professionals evaluate information and evidence in an impartial and unbiased manner. Parsimony encourages identifying the simplest explanation for security issues. Skepticism helps cybersecurity professionals avoid complacency and stay vigilant against new threats. Ethical neutrality is important in balancing security needs with ethical and legal obligations. Determinism helps to identify the underlying causes of security issues and develop more effective security measures. Overall, these principles help cybersecurity professionals develop more effective security measures and strategies to protect critical information systems and networks.
Journal entry #3
PrivacyRights.org provides a database of publicly reported data breaches, including the date, type, and scope of the breach, as well as the number of individuals affected. Researchers could use this information to study breaches in a variety of ways. . Researchers could also use this information to develop predictive models that could help organizations anticipate and prevent breaches in the future. Overall, the data available on PrivacyRights.org could be a valuable resource for researchers seeking to better understand the dynamics of data breaches and improve cybersecurity practices.
Journal entry #10
The article shows the critical role of human behavior in cybersecurity, particularly the use of social engineering tactics by cybercriminals to exploit human vulnerabilities. It emphasizes the need for a comprehensive approach to cybersecurity that takes into account social and behavioral aspects, in addition to technical solutions. The article also emphasizes the importance of building a culture of cybersecurity within organizations and educating individuals on how to recognize and respond to cyber threats. This approach can empower individuals and organizations to be more vigilant and proactive in protecting their data and systems. The article provides valuable insights into the complex world of cybersecurity, and explains the importance of addressing the human element in cybersecurity. By doing so, individuals and organizations can strengthen their defenses against cyber threats and better protect their assets.
Journal entry #11
The video talks about the job of a cybersecurity analyst. They need to have good eyes to spot when bad guys are trying to trick people online. This tricking is called “social engineering” and it’s when criminals make people give away private information or do things that can hurt them. Cybersecurity analysts must understand how people behave online and how the bad guys try to trick them. To do this, they need to know what motivates the bad guys and what makes people vulnerable to their tricks. This means that a cybersecurity analyst must have not only technical skills but also knowledge about how people behave online and how bad guys can harm them.
Journal entry #12
The sample data breach notification letter is a letter that informs customers about a data breach and the potential risks associated with it. Two economics theories that relate to this letter are game theory and information asymmetry theory. Game theory means that the company is using the notification as a strategy to limit the damage caused by the breach and act in the best interest of both the company and the customers. Information asymmetry theory means that the customers are unaware of the breach, and the notification reduces the information asymmetry between the company and the customers. Two social sciences theories that relate to this letter are social identity theory and diffusion of innovation theory. Social identity theory means that the notification aims to preserve the company’s reputation and identity by reassuring customers that the company is taking necessary steps to protect their data. Diffusion of innovation theory means that the notification aims to encourage individuals to adopt new behaviors or take action by introducing the concept of a data breach and the potential consequences associated with it.
Journal entry #13
I think that the 5 most serious violations are Downloading and distributing child pornography, hacking, cyberstalking and cyberbullying, identity theft , and cyberterrorism. I think these offenses are most serious because they involve harming individuals, stealing personal information, causing financial loss, and creating a threat to society.
Journal entry #14
I think that the speaker’s pathway of his career shows how social science is important in digital forensics. Digital forensics investigators use both technical skills and knowledge of how people behave and interact to understand and solve problems related to cybercrime. His speech and pathway gives useful information about digital forensics and shows that it takes different fields of study.