Journal Entry Posts

  • Journal 1

    I think that the area I would want to focus my either Protection and defense or Cyberspace Intelligence. I like the idea of the puzzle solving aspects of Protection and defense. Gathering new ideas and ways to protect or get into systems really intrigues me. I think that my least favorite would have to be……

  • Journal 3

  • Journal 2

    The principles of science, which emphasize systematic investigation, empirical evidence, and hypothesis testing, are closely intertwined with the field of cybersecurity. At its core, cybersecurity involves the protection of computer systems, networks, and data from unauthorized access or attacks. This requires a deep understanding of various scientific disciplines, such as mathematics, computer science, and cryptography….…

  • journal 5

    As I reflect on the different motives that drive human behavior, I’ve ranked them from what I think makes the most sense (1) to the least sense (7). Here’s how I would rank them and why: In summary, motives like money, multiple reasons, and revenge seem the most reasonable to me, as they often lead……

  • Journal 4

    Maslow’s Hierarchy of Needs outlines a progression of human motivations, with technology playing a significant role in each level. At the base, physiological needs are addressed by digital tools like food delivery apps and health trackers, ensuring access to essentials without leaving home. For safety needs, technology offers security through tools like GPS navigation, security……

  • Journal Week 15

    After watching Davin Teo’s TEDx talk on his journey into digital forensics, I was inspired by how his career unfolded. Starting as an accountant, he transitioned into IT and eventually specialized in digital forensics. This shift underscores the dynamic nature of career paths and the importance of adaptability. His story resonates with me, as it……

  • Journal 14

    Andriy Slynchuk describes several actions on the internet that could lead to legal consequences, but five stand out as particularly serious. First, hacking and unauthorized access, which involves gaining access to someone’s computer or network without permission, is a major violation as it compromises privacy, security, and can lead to identity theft or more severe……

  • Journal Entry 13

    Summary and Reaction to Bug Bounty Policies Bug bounty programs are an increasingly popular cybersecurity policy that leverages ethical hackers to identify vulnerabilities in a company’s infrastructure. The article “Bug Bounty Programs: Institutionalized Credence Goods” explores the economic and social dimensions of these programs, particularly how they function as cost-effective security measures for organizations. The……

  • Week 12 Journal Entry

    Economic and Social Science Theories in the Sample Data Breach Notification The sample data breach notification from Glasswasherparts.com highlights the financial and social consequences of a cybersecurity incident. The letter informs customers about the breach, outlines potential risks, and provides steps for protecting their information. This situation can be analyzed through both economic and social……

  • Journal Week 11

    In the video “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” several social themes emerge that highlight the importance of interpersonal skills in the cybersecurity field. Cybersecurity analysts often conduct training and awareness programs to educate employees about information security risks, threats, and best practices. This role involves engaging with staff across……

  • journal week 10

    The concept of social cybersecurity highlights the evolving nature of warfare, where information itself becomes a powerful weapon. This article underscores how state and nonstate actors manipulate digital platforms to influence public perception, erode trust in institutions, and reshape societal values—all at an unprecedented scale. Unlike traditional cybersecurity, which focuses on protecting information systems from……

  • Journal entry 10

    After completing the Social Media Disorder (SMD) scale, I reflected on my score and how social media affects my daily life. My score was relatively low, indicating that while I use social media regularly, it doesn’t significantly interfere with my responsibilities or well-being. However, I found some of the items on the scale particularly interesting,……

  • Journal Entry Week 8

    The Media’s Influence on Our Understanding of Cybersecurity The media plays a huge role in shaping how we perceive cybersecurity, but I think its influence is often a double-edged sword. On one hand, news outlets, movies, and TV shows bring awareness to cyber threats, making people more cautious about online security. Major data breaches, hacking……

  • Journal 7

    The meme I created illustrates the challenges someone might face while working in a cafe, which ties into the Human Systems Integration framework. In the meme, the individual experiences frustration due to technical issues, like Wi-Fi disruptions, and the potentially distracting environment, represented by the “spying” coffee. This highlights how the design of a system……

  • Journal for Week 6

    Spotting Fake Websites Today I challenged myself to identify and compare fake websites with their authentic counterparts. I examined three examples and noted the subtle discrepancies that revealed their fraudulent nature. 1. Example 1: Fake: www.goggle.com Real: www.google.com Observation: The fake site transposes letters by using goggle instead of google This slight misspelling can easily……