Journal Entries

Journal Entry 1 Week 1 – Protection and defense would be an area I would like to work in because I would like to learn how to put cyber security safety measures in the places I plan to work to protect the companies from cyber attacks and to best respond to cyber crimes. Investigation would be another place of interest because I would like to delve into the world of cyber crime and how to best respond to it. plus I like the idea of investigating cyber crime. What I would not be interested in is oversight and governance because I’m not interested in the governance of cyber security. And I am not interested in cyberspace effects because I’m not interested in the effects of cyberspace.

Journal Entry 2 Week 2 – Parsimony relates to cyber security because it is important to be able to simplify the cyber security concepts for better understanding. With better understanding comes better efficiency and results in working with concepts of cyber security. Empiricism relates to cyber security because it helps us to comprehend the reality of the concepts of cyber security through our senses and not opinions. Determinism relates to cyber security by explaining to us why people do what they do in the cyber space like why cyber criminals commit cyber crime. It answers what led them to commit the crime in the first place. Objectivity relates to cyber security because it helps us deal with issues or study issues in a bias free manner.

Journal Entry 3 Week 3 – The website does display information about data breaches that can help researchers understand data breaches. The website gives readers a definition of what a data breaches so readers can know what a data breach is. They also display different kinds of graphs and kinds of data that display data breaches from different areas like states and companies. These graphs can help readers show how prevalent data breaches are and why the need for Cyber security is there. One data shows which companies had data breaches and what kind of breach they experience. This can show readers which kind of data breach is more prevalent. I guess knowing which breach is more prevalent can make companies prepare against those kinds of breaches the most.

Journal Entry 4 Week 4 – the internet has become a physiological need for me. I need it for school and I use it for entertainment purposes. Whenever I lose my phone I get irritated. It bothers me when my phone is lost. For security needs, if there is a virus, I may feel fear because my device is not working properly and I don’t want to get in trouble with my parents if I know I may have accidentally caused the virus. For my sense of belonging, I like having messages from my followers. For esteem, it depends what I’m watching and how it effects my esteem. Like if I watch uplifting content, it helps my esteem. For self fulfillment needs, it feels nice to have an assignment completed.

Journal Entry 5 Week 5 –

1. For Money

I rank for money number one because I think most Cyber crimes involve money especially in this economy where inflation has gone up. Plus the article linked under for money on slide 3 says its no surprise that Cyber criminals are financially motivated.

2. Political

I ranked political as number three because Cyber security is a big thing in politics. First, its a protection for national security, and second, it’s used to protect politicians and political candidates’ information.

3. Revenge

I listed revenge as this because people who do this would probably do revenge cyber crime because they didn’t get what they want or was wronged in some way.

4. Entertainment

I ranked it as this because I don’t think a lot of people do cyber crime for entertainment since there’s a lot of other things that is legally entertainment but I think someone would do this because they love the idea of creating trouble.

5. Boredom

I ranked it as this because again, I don’t think a lot of people would consider doing a cyber crime when they are bored because there are millions of things to do that are legally entertaining. Someone who would do this when they are bored probably loves the idea of causing trouble. 

6. Multiple reasons

I ranked it as low because I think most people who would do cyber crime have like one reason to do so and not multiple. I mean its possible to have multiple reasons, I just don’t think it’s common.

7. Recognition

I ranked this as lowest because I don’t think most cyber criminals wanna be recognized for a crime they did.

Journal Entry 6 Week 6

Three ways you know a website is fake

– The url may have bad spelling. Like for example the real website has the spelling Amazon but the fake website has the spelling Amazonn in the url.- https://www.identityguard.com/news/how-to-tell-if-a-website-is-fake ,  https://bolster.ai/glossary/website-spoofing

-The website may have incorrect grammar. – https://www.identityguard.com/news/how-to-tell-if-a-website-is-fakeLinks to an external site.

-The website may have bad quality look – https://www.identityguard.com/news/how-to-tell-if-a-website-is-fake

Three ways you know a website is real

-The website begins with https:// – https://www.cuit.columbia.edu/legit-websitesLinks to an external site.

Journal Entry 8 Week 8 – The media shows whatever they want to show, and it’s easy to think that whatever the media shows is the truth when it might not always show the truth. The media will show what they want you to show and they’ll try to make whatever they show believable even if it’s not right. How the media can influence our knowledge of cyber security is by showing us the elements or whatever they want to show about cyber security and I think people usually just take the information at face value without even researching because who researches everything they see from the media? Plus research takes time, and I don’t even think it crosses people’s minds to verify the validity of whatever the media shows so they most likely will take it at face value.

Journal Entry 9 Week 10 –

How did you score? 

I scored a 6-9.

What do you think about the items in the scale? 

I think the items are great assessing whether or not you have a problematic usage for the internet. It really makes a person reflect on their usage of social media and how it has affected their relationships and themselves physiologically.  They ask good questions that a lot of people can asses their social media usage.

Why do you think that different patterns are found across the world?

I think different patterns are found in the world for some reasons. One, some people are disciplined in their usage of social media others are not. Two some may have limited access to it or no access at all. It really depends on the individual.

Journal Entry 10 Week 11 – Social cyber security is important today and in the future to protect against information warfare launched by rivaling nations that want to harm nations by means of information. Information is a very powerful tool that can be used to bring together or destroy people as it has the power to influence people by the means of the words it uses to convey the desired meaning to the masses, and it can be very dangerous when used with malicious intent to harm others. With technology advancing quickly, it is important to have a social cyber protection against information warfare from rivaling nations.

Journal Entry 11 Week 11 – Cyber security analyst relates to social behavior as it is job that responds to criminal Cyber behavior and works to keep information safe. There are people out there always looking to steal information from companies to harm the companies, and as Cyber analyst they are there to respond to those criminal cyber behaviors. It is a job very much needed, and it offers a high salary since not a lot of people work in so that could be attracting people in that field which I guess could be a tactic to attract people because humans are attracted to whatever they think benefits them.

Journal Entry 12 Week 12

Two economic theories that can relate to this letter are the classic economic theory and the laissez-fare economic theory. The classic economic theory can be applied to this letter because the company was able to monetize the customers’ information without the government interfering. The laissez-fare economic theory can relate to this letter because law enforcement, which is part of the government, responded to data breach which threatened and possibly broke through the privacy of customer’s information. Behavioral theory can be applied to this intrusion into a system is a learned behavior. Neutralization theory can probably be applied to this as the individual or individuals knew most likely that it was wrong to intrude into the system but they did it anyway, and they probably would rationalized their behavior.

Journal Entry 13 Week 12 -The article shows the importance of bug bounties by running a study on a bug bounties. Bug bounties are these researchers that are paid to find vulnerabilities in a company code bases so I guess they’re like good hackers that actually hack with a purpose that does good for the company instead of evil towards a company. They are important because they can help a company build a better defense system against criminal cyber behavior that may want to harm businesses for the criminal’s own interest. Sometimes companies may not have good defense system against criminals, and that is why good hackers are needed to help with better defenses.