Journal Entry 1- Reviewing the NICE Workforce Framework, are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. 

The NICE Workforce Framework is a helpful guide for understanding cybersecurity roles. It breaks down jobs into categories like Securely Provision, Operate and Maintain, and Protect and Defend. Personally, I’m most interested in roles that fall under “Protect and Defend,” where I can actively work on securing systems through tasks like penetration testing. This aligns with my goal of being hands-on in preventing cyber threats. However, roles in “Operate and Maintain” might be less appealing to me since they involve more day-to-day tasks, and I prefer a more strategic focus in my work. Overall, the framework is a useful tool for anyone navigating a career in cybersecurity, providing a clear path for specialization. 

Journal Entry 2- Explain how the principles of science relate to cybersecurity  

In cybersecurity, the principles of science help us understand and tackle threats. It’s like using a scientific approach to explore and solve problems. We observe what’s happening in the digital world, gather data on potential risks, and then analyze it to figure out how to protect against cyber threats. This scientific mindset helps us create effective strategies and solutions based on evidence and a clear understanding of how things work in the cybersecurity landscape. So, just like scientists use principles to study the natural world, cybersecurity professionals use similar principles to keep digital environments safe and secure. 

Journal Entry 3- Visit PrivacyRights.org to see the types of publicly available information about data breaches.  How might researchers use this information to study breaches?  Enter a paragraph in your journal. 

Researchers can use information from PrivacyRights.org to study data breaches by analyzing the details provided about each incident. This data often includes the type of information compromised, the methods used in the breach, and the organizations affected. By examining patterns and trends across multiple breaches, researchers can identify common vulnerabilities and tactics employed by cybercriminals. This information is valuable for understanding the evolving landscape of cybersecurity threats and developing effective preventive measures. Overall, the insights gained from studying data breaches on PrivacyRights.org contribute to ongoing research efforts aimed at enhancing the security of digital systems and protecting sensitive information. 

Journal Entry 4- Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. 

Maslow’s Hierarchy of Needs can be applied to my experiences with technology. At the basic level of physiological needs, technology, like smartphones and wearables, helps me access essential information for health and well-being, such as fitness apps and medical resources. Moving up to safety needs, cybersecurity measures and password protection ensure my digital data is secure, addressing concerns about personal safety in the online space. Social needs are met through social media platforms and digital communication tools that enable connections with friends and family. Esteem needs find fulfillment in achievements facilitated by technology, such as completing online courses or professional accomplishments using digital tools. At the self-actualization level, technology empowers creative expression, learning, and pursuing personal goals, like using online platforms for skill development or content creation. Overall, my digital experiences align with various levels of Maslow’s Hierarchy, reflecting technology’s role in fulfilling fundamental human needs. 

Journal Entry 5- Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 

  1. For Money: Financial motivations make the most sense, as they provide a tangible and straightforward reason for engaging in cybercrime. The article on how cybercriminals spend their money supports the idea that monetary gain is a significant driving force. 
  1. Revenge: Seeking revenge is a powerful motivator, and the emotional toll on revenge porn victims, as highlighted in the third link, shows that this motive can have severe consequences and is a plausible reason for engaging in cybercrime. 
  1. Recognition: The desire for acknowledgment, as seen in the fifth link, is a significant motive. Hackers engaging in activities for recognition, such as DDoS attacks during elections, demonstrates a need for visibility within certain communities. 
  1. Political: Political motivations, as discussed in the second link, make sense as they are driven by ideological beliefs and can have wide-reaching consequences. The involvement of angry youthful hackers in hacktivism adds a layer of social and political significance. 
  1. Entertainment: While the motive for entertainment is understandable, it ranks lower because the consequences of such actions, as seen in the first link about LinkedIn scraping, may not directly impact individuals in harmful ways compared to other motives. 
  1. Boredom: Boredom, as a motive for cyberbullying and online grooming of children, is concerning. However, it ranks lower as it may be perceived as a less justifiable reason for engaging in harmful activities compared to other motives. 
  1. Multiple Reasons: The motive of having multiple reasons ranks lowest, as it suggests a lack of clear intent or a mix of motivations that might not be as focused or predictable. This complexity makes it less straightforward to understand and address. 

Journal Entry 6- Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? 

Yes, First by Checking the URL. With a Fake Website Look for misspellings, extra characters, or variations in the domain name. Fraudulent sites often try to mimic real ones but with subtle differences. A Real Website The URL should be consistent with the official domain of the company or organization. Look for Secure Connections. Fake Websites Lack of HTTPS in the URL or a missing padlock icon in the address bar might indicate an insecure connection. Real Website, Legitimate sites use HTTPS to encrypt data, providing a secure connection for users. 

Journal Entry 7-Write a journal entry about how you think the media influences our understanding about cybersecurity. 

The media significantly shapes our understanding of cybersecurity by playing a crucial role in disseminating information and framing narratives about digital threats. News stories, articles, and headlines contribute to public awareness, highlighting the latest cyber incidents, breaches, and preventive measures. However, the media’s tendency to sensationalize certain events can sometimes create a skewed perception of cybersecurity risks. It influences public attitudes, shaping how individuals perceive online safety and the severity of digital threats. Media coverage can also impact policy discussions and corporate responses to cyber incidents. Striking a balance between raising awareness and avoiding unnecessary panic is essential for fostering a more informed and nuanced understanding of cybersecurity among the general public. 

Journal Entry 8- Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.   

The letter informs customers of a data breach at www.glasswasherparts.com, where an intrusion occurred between February and December 2016. The breach involved customer data, including names, addresses, phone numbers, and payment card details. The platform provider, responsible for the website’s operation, detected the breach in November but delayed notifying customers to aid the ongoing investigation. The company has taken measures to remove malware and enhance cybersecurity, urging customers to contact their card providers for replacements and monitor their accounts for suspicious activity. The letter also suggests visiting the California Office of Privacy Protection’s website for additional information on identity theft and provides a contact number for further assistance. 

Journal Entry 9- Andriy Slynchuk has described eleven things Internet users do that may be illegal.  Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. 

Andriy Slynchuk highlights various potentially illegal actions by internet users, but the five most serious violations include activities like hacking, unauthorized access to computer systems, identity theft, distributing malware, and engaging in cyberbullying or online harassment. Hacking and unauthorized access can compromise sensitive data and lead to significant privacy breaches. Identity theft poses severe risks to individuals, potentially causing financial and personal harm. Distributing malware not only compromises the security of computer systems but can also have widespread and damaging consequences for users. Cyberbullying and online harassment are serious offenses as they can lead to emotional distress, psychological harm, and even physical consequences for victims. These violations are considered serious due to the potential for substantial harm, both to individuals and the broader online community, emphasizing the importance of legal boundaries in cyberspace. 

Journal Entry 10- Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences.  Write a journal entry describing what you think about the speaker’s pathway to his career. 

 
Switching from accounting to IT shows a person’s adaptability and a mix of skills. Starting in accounting means they’re good with numbers and details. Moving to IT suggests they’re open to technology and recognize its importance. This shift came from a desire to explore new areas, using their analytical skills in both finance and technology.  

Journal Entry 11- Review the following ten photos through a cybersecurity human systems integration framework.  Create a meme explaining what is going on in the individual’s or individuals’ mind(s). 

We can’t paste this image from the Clipboard, but you can save it to your computer and insert it from there.

When the Non robot test says you doesn’t have that dog in them. 

My meme means that sometimes when you get a non robot test it will ask you or make you do something to let you in the site. 

Journal Entry 12- Read this and write a journal entry summarizing your response to the article on social cybersecurity 

The article emphasizes the significance of social cybersecurity as an emerging domain in national security, stating its influence on conventional and unconventional warfare. Social cybersecurity involves understanding and predicting cyber-mediated changes in human behavior and societal outcomes, with technology enabling manipulation of global beliefs and ideas. The concept, often termed “cognitive hacking,” distinguishes itself from traditional cybersecurity by focusing on humans as targets rather than information systems. The piece highlights the multidisciplinary nature of social cybersecurity, blending various sciences and leveraging computational tools. The author underlines the strategic implications of an “information blitzkrieg,” drawing parallels to the physical blitzkrieg of World War II. The discussion delves into the Russian information warfare blitzkrieg, emphasizing its sophisticated and strategic use of technology to manipulate information and sow discord, showcasing the need for a deep understanding of social cybersecurity for defense and strategic preparedness. 

Journal Entry 13- Watch this video.  As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. 

The description of the cybersecurity analyst job is intricately linked to social behaviors, highlighting the intersection between technology and human actions. In the realm of cybersecurity, analysts play a crucial role in understanding and predicting cyber-mediated changes in social behaviors. The emphasis on cognitive hacking underscores the recognition that technology is not merely a tool but a medium through which humans can be influenced, manipulated, or targeted. Social themes in the presentation revolve around the impact of cyber threats on human society, emphasizing the need for analysts to comprehend not just technological vulnerabilities but also the intricate dynamics of human behavior. The discussion suggests that effective cybersecurity strategies must account for the social aspects of cyber threats, considering how individuals and societies respond to, resist, or fall victim to various cyber tactics. This perspective reinforces the idea that successful cybersecurity measures require a deep understanding of the social sciences, including psychology, sociology, and communication science, to effectively navigate the complex landscape of cyber-mediated information environments.