Week 15 Journal

Watch this video and think about how the career of digital forensics investigators relates to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

It is reassuring to hear about Davin Teo’s experience in various IT fields. His notion of falling into digital forensics reminds me of how “Cybersecurity” and/or “IT” can be considered blanket degrees that can lead to various career paths. A prime role model I have found is an online streamer by the username “Thor”. He served as an ethical hacker for 20 years, offering his expertise to the federal government, and served as lead applications security for Blizzard Entertainment. Nowadays he is an online game developer and streamer. Having a wealth of knowledge about the complexities of networking, internet legislation, programming, and computer troubleshooting will always be needed in society and can offer many career opportunities.

Week 13 Journal

Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

The internet offers new capabilities for users on a global scale. Although easily accessible, some of these capabilities are deemed offensive and violate real-world laws.

Sharing personal information of another person or Doxxing is a serious offense as it opens the door for identity theft. It is a deliberate action to weaken a person’s ability to protect themselves and their private information. Likewise, collecting information on underage users violates the Children’s Online Protection Act and can be considered an act of endangering a child.

Committing an act of Cyberbullying, stalking, harassment or direct offensive behavior online violates 18 U.S. Code § 875 Interstate Communications law detailing the consequences of transmitting threats to kidnap or threaten the life of another person (justice.gov, 2020). Threatening the life of another person should be treated the same as an in-person case. I would also include the use of offensive cyber operations including committing a denial of service attack. Not only could it be considered stealing but it could lead to damages beyond the scope of what financial compensation could fix. This is most notable for critical infrastructures that run their business with reliance on internet connectivity.

The author describes that making illegal internet searches is offensive as well. While I agree that seeking knowledge into committing an illegal act or finding where to access illegal material should be investigated; I would like to include the creation of illegal material on the internet as a serious offense. Trolling online by posting fake links is a common practice, but the creation of questionable material can put an innocent user at risk of exposure. Questionable online material should be monitored, even when under the guise of educating the public. While this can fall into the debate of censorship, I believe the objective of the material should determine the legality of it and whether it should be removed entirely.

Using another person’s internet can be considered theft; however, what makes this a bigger concern is the dangers an unknown system on a network can pose. To access a network unknowingly, a password must have been breached whether on the access point or remote accessing a user’s system. This would be similar to making a copy of someone’s house or car key and using it without the owner’s knowledge. Accessing a network without permission could also be considered trespassing on private property with the capability to put the owners in danger.

1069. overview of pertinent provisions-interstate and foreign extortion. Justice Manual | 1069. Overview of Pertinent Provisions-Interstate and Foreign Extortion | United States Department of Justice. (2020, January 21). https://www.justice.gov/archives/jm/criminal-resource-manual-1069-overview-pertinent-provisions-interstate-and-foreign-extortion#:~:text=Section%20875%20of%20Title%2018,a%20threat%20to%20injure%20the

Week 12 Journal (2)

Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

It is interesting that companies would officially allow outsourcing of their cybersecurity testing to freelance researchers. It is also understandable that some companies would prefer not to set policies in place to allow freelance researchers to disclose findings. To allow a program’s researchers to dive into a company’s infrastructure takes a lot of trust in the community, and when there is a shortage of experts to hire, having a fresh set of eyes and new perspectives improves the quality of a company’s systems. It is nice to know that even smaller companies with smaller budgets can benefit from freelance research. I would like to imagine this becoming more commonplace in the future as trust is built between freelance hackers and companies looking for cost-effective methods to improve their systems. Perhaps future developments could incentivize using hacking skills positively and lessen the incentives for black hat hacking by offering a positive and fulfilling long-term alternative.

Week 12 Journal (1)

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

From the Sample Breach letter, we can gather some motivations and behaviors tied to the theories related to the course’s modules.

When it was revealed to the reader that the breach had occurred roughly a year ago it was noted, by Rational choice theory, that notifying the affected customers did not fit in the best interest of the investigators nor the company at the time, as it could have interfered with the investigation and caused a disruption to the company. Agency theory explains the conflicting interests of businesses and their customers, and the desire to come to an agreement that minimizes the incongruence. The company is now working to Appeal to the customer’s desire to recover any stolen information and the business is trying to maintain customer trust.

By offering what looks like a government-assisted Privacy Protection Office’s contact information, it looks like Laissez-faire economic theory played a part as the government did not have any authority over the breached company’s financial information management, but is offering to resolve the customers’ right to Privacy.

Understanding the Theory of Planned Behavior, the breached company offered a way for customers to take control of the situation; understanding that the intentions of the customers will be to resolve possible identity theft. The company had also offered to be transparent with their intentions for being quiet about the breach for so long as customers would begin to raise concern for the company’s trustworthiness.

Week 11 Journal (2)

Write a paragraph describing social themes that arise in the presentation.

https://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site.

Nicole Ennesse does a wonderful job of preparing the viewer to enter the cybersecurity field as a Cyber Analyst; however, there are social themes that depict issues for the field’s outlook in the future. The position is labeled as “entry-level” and described to be more suitable for people willing to work around the clock without personal responsibilities outside of work. Entry-level jobs are often seen as of low importance, but the description given in the video details the analyst as the front lines of cyber attack mitigation. The idea of working “graveyard shifts” would also be off-putting to most despite how important the position is for an organization. Location was a big part of the presentation that should be considered. When people look for jobs, they consider the opportunities around them and the cost of living. An area like New York would find fewer entry-level applicants for the position as the cost of living is much higher; leaving a shortage of experts in the field in that area. Salary again motivates what kinds of degrees are sought after, leaving a shortage for other fields and positions.

Week 11 Journal (1)

Read this and write a journal entry summarizing your response to the article on social cybersecurity

https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.

Army University Press’ Journal article Social Cybersecurity details the adverse social effects cyber technologies have on national security. I agree that modern cyber technology is not only waging war on critical systems but also on the trust society has in its critical infrastructures, each other, and its government. The internet makes the spread of misinformation too easy, and it would be crucial to have an open conversation with the public and educate them on the dangers of internet psychological warfare. Cyber warfare is a war on human psychology. Resolving this through a multidisciplinary lens allows for a more thorough resolution. The conversation to define internet censorship and infringement of speech is much needed if the nation wants to improve its defenses.

Week 10 Journal

Complete the Social Media Disorder scaleLinks to an external site..  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

On the Social Media Disorder scale, I answered yes to four out of the nine questions. I have never really thought too much of social media usage being an issue. I personally only use social media to text or to watch something funny. I think it is easy to use social media as an escape from processing negative emotions. I have also said yes to having difficulty stopping when I needed to as many platforms today use algorithms to keep users engaged on the site.

Patterns around the world may be different because of their culture’s values towards finding importance in the real world as opposed to finding instant gratification for oneself. A few years ago I read that some countries have enacted curfews on internet usage to target gaming addictions.

Week 8 Journal

After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity

I appreciate the media such as movies and television shows for bringing the importance of securing our private data to the public view. The unfortunate side effect is that most of the time processes and strategies are oversimplified to keep the story moving. It is only natural that directors would want to over-dramatize the maliciousness of a cyber attack with complicated jargon to make the incorporation of technology more impactful; however, this can distort the public perception of how cyber attacks are conducted.

I think the media creates a fantasy that can unfortunately become someone else’s reality if they are not knowledgeable on the subject. For example, in the spear phishing segment of the video, a hacker used a device to brute force a password that would have realistically taken much longer than it did. This could make hacking look too easy and degrade the belief that strong passwords matter.

Insider. (2021, March 16). Hacker rates 12 hacking scenes in movies and TV | how real is it? | insider. YouTube. https://www.youtube.com/watch?app=desktop&v=6BqpU4V0Ypk