Journal Entry #14

Write a paragraph describing the five most serious violations and why
you think those offenses are serious.


Of the list described by Slynchuk, I believe the five most serious violations are: Illegal searches on the internet, sharing passwords, addresses, or photos of others, using torrent sites, using other peoples internet, and bullying and trolling. Illegal searches on the internet is a serious violation because it generally involves illegal things in real life such as child pornography. Usually you can search these things but you will be flagged and monitored by authorities. Sharing sensitive data such as passwords or even photos without the consent of others not only breaks the trust of that person but can lead to illegal activity such as revenge porn. In the early days of the internet, prior to streaming, torrenting was extremely prevalent because there were no streaming services where a user could view their favorite shows. This allowed people to download a particular item without having to pay. However, this is considered theft and you can be prosecuted (example: napster vs Metallica.) Unauthorized use of someone’s internet could compromise your network security as well as theirs. Not to mention this could slow down their network, possibly leading to issues with that person’s work setup! Picture this like siphoning gas from someone else’s car (they can’t get to work, you are stealing something they paid for.) Lastly, bullying and trolling creates a toxic environment that could cause distress especially for children. Many children have taken their lives due to cyberbullying. These violations break down the good digital community and its important to practice smart internet hygiene!





Journal Entry #12

Read the sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.


Economic Theory
Rational Choice theory and Keynesian Economic Theory can be related to this letter. Rational choice theory states that individuals make decisions in their best interest. With respect to the letter, the company decided to let customers know about the incident and about what they can do to protect their information. This in turn allows the customer to decide how they would like to proceed in a way that would be most beneficial to them. The Keynesian Economic Theory is the thought that government intervention can stabilize the economy. In this case there was a delay in the notification to the customers which was needed so that the government could stabilize the incident and recover respective evidence.

Social Sciences Theory
Labeling theory and Conformity theory are social science theories that can be applied to this letter. Labeling theory is the theory that how someone identifies and the behavior of an individual may be determined or influenced by terms used to classify them. In the letter the customers are labeled as possible victims of identity theft/fraud. This would make them react to the letter in a way that would most likely protect their assets. Conformity is the act of matching attitudes and behaviors to group norms. In this letter everyone is being addressed at one time, collectively. This in turn may influence them to conform to a particular behavior in response.

Journal Entry #11

Watch https://www.youtube.com/watch?v=iYtmuHbhmS0. Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

In the referenced video a woman discussed the role of cybersecurity analyst. The factors described when determining if someone wanted to take this role included: cost of living, job field growth, education, and income.

There is an increased need for cybersecurity analysts as cyberwarfare and technology has progressed. People are becoming more aware of potential threats and the need for cyber security professionals. This means that the job field is in greater demand than ever before.

The education piece is quite interesting when brought up from a social aspect. While there is a greater demand for security professionals, they do not all need to follow the same pipeline. Some folks may enter the field with a college degree while others can earn certifications and show off their experience via uploading their own programs to places such as Github. This allows for a socially diverse group of people in this field There is a potential for high income in this field starting low as 95k a year, depending on location. This allows for entry level personnel to improve their financial situations.

Journal Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/


As technology has advanced so has cyberwarfare. Russia has been at the forefront of this advancement. We’ve seen it as early as 2003 but most effectively between 2016 and 2018. They have been able to successfully manipulate information and networks by use of misdirection, hashtag latching, smoke screening, and thread jacking. 20 years ago if someone heard the term ‘thread jacking’ they would think it meant stealing sewing supplies! But, today it means co-opting a conversation and turning it into something else- usually done on twitter or reddit. A growing number of bots are also used to push particular narratives and propaganda. This means that warfare is more covert than ever and there is more of an effort needed in the cyber realm to mitigate these forces.