{"id":345,"date":"2025-04-26T08:15:11","date_gmt":"2025-04-26T08:15:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/?page_id=345"},"modified":"2025-04-26T08:30:54","modified_gmt":"2025-04-26T08:30:54","slug":"journal-entry-posts","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/journal-entry-posts\/","title":{"rendered":"Journal Entry Posts"},"content":{"rendered":"\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-layout-1 wp-block-post-template-is-layout-grid\"><li class=\"wp-block-post post-335 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/26\/journal-1\/\" target=\"_self\" >Journal 1<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">I think that the area I would want to focus my either Protection and defense or Cyberspace Intelligence. I like the idea of the puzzle solving aspects of Protection and defense. Gathering new ideas and ways to protect or get into systems really intrigues me. I think that my least favorite would have to be&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-26T08:03:59+00:00\">April 26, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-333 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/26\/journal-3\/\" target=\"_self\" >Journal 3<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\"> <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-26T08:03:37+00:00\">April 26, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-331 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/26\/journal-2\/\" target=\"_self\" >Journal 2<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The principles of science, which emphasize systematic investigation, empirical evidence, and hypothesis testing, are closely intertwined with the field of cybersecurity. At its core, cybersecurity involves the protection of computer systems, networks, and data from unauthorized access or attacks. This requires a deep understanding of various scientific disciplines, such as mathematics, computer science, and cryptography&#8230;.&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-26T08:03:13+00:00\">April 26, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-329 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/26\/journal-5-2\/\" target=\"_self\" >journal 5<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">As I reflect on the different motives that drive human behavior, I&#8217;ve ranked them from what I think makes the most sense (1) to the least sense (7). Here&#8217;s how I would rank them and why: In summary, motives like money, multiple reasons, and revenge seem the most reasonable to me, as they often lead&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-26T08:02:55+00:00\">April 26, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-327 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/26\/journal-4\/\" target=\"_self\" >Journal 4<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Maslow&#8217;s Hierarchy of Needs outlines a progression of human motivations, with technology playing a significant role in each level. At the base, physiological needs are addressed by digital tools like food delivery apps and health trackers, ensuring access to essentials without leaving home. For safety needs, technology offers security through tools like GPS navigation, security&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-26T08:02:27+00:00\">April 26, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-308 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/21\/journal-week-15\/\" target=\"_self\" >Journal Week 15<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">After watching Davin Teo&#8217;s TEDx talk on his journey into digital forensics, I was inspired by how his career unfolded. Starting as an accountant, he transitioned into IT and eventually specialized in digital forensics. This shift underscores the dynamic nature of career paths and the importance of adaptability. His story resonates with me, as it&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-21T20:54:48+00:00\">April 21, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-306 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/04\/07\/journal-14\/\" target=\"_self\" >Journal 14<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Andriy Slynchuk describes several actions on the internet that could lead to legal consequences, but five stand out as particularly serious. First, hacking and unauthorized access, which involves gaining access to someone\u2019s computer or network without permission, is a major violation as it compromises privacy, security, and can lead to identity theft or more severe&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-04-07T20:43:48+00:00\">April 7, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-304 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/03\/31\/journal-entry-13\/\" target=\"_self\" >Journal Entry 13<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Summary and Reaction to Bug Bounty Policies Bug bounty programs are an increasingly popular cybersecurity policy that leverages ethical hackers to identify vulnerabilities in a company\u2019s infrastructure. The article \u201cBug Bounty Programs: Institutionalized Credence Goods\u201d explores the economic and social dimensions of these programs, particularly how they function as cost-effective security measures for organizations. The&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-03-31T21:29:32+00:00\">March 31, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-302 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/03\/31\/week-12-journal-entry\/\" target=\"_self\" >Week 12 Journal Entry<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Economic and Social Science Theories in the Sample Data Breach Notification The sample data breach notification from Glasswasherparts.com highlights the financial and social consequences of a cybersecurity incident. The letter informs customers about the breach, outlines potential risks, and provides steps for protecting their information. This situation can be analyzed through both economic and social&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-03-31T21:27:41+00:00\">March 31, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-300 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/03\/24\/journal-week-11\/\" target=\"_self\" >Journal Week 11<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">In the video \u201cWhat does a Cybersecurity Analyst Do? Salaries, Skills &amp; Job Outlook,\u201d several social themes emerge that highlight the importance of interpersonal skills in the cybersecurity field. Cybersecurity analysts often conduct training and awareness programs to educate employees about information security risks, threats, and best practices. This role involves engaging with staff across&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-03-24T17:45:55+00:00\">March 24, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-298 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/03\/24\/journal-week-10\/\" target=\"_self\" >journal week 10<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The concept of social cybersecurity highlights the evolving nature of warfare, where information itself becomes a powerful weapon. This article underscores how state and nonstate actors manipulate digital platforms to influence public perception, erode trust in institutions, and reshape societal values\u2014all at an unprecedented scale. Unlike traditional cybersecurity, which focuses on protecting information systems from&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-03-24T17:43:42+00:00\">March 24, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-296 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/03\/18\/journal-entry-10\/\" target=\"_self\" >Journal entry 10<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">After completing the Social Media Disorder (SMD) scale, I reflected on my score and how social media affects my daily life. My score was relatively low, indicating that while I use social media regularly, it doesn\u2019t significantly interfere with my responsibilities or well-being. However, I found some of the items on the scale particularly interesting,&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-03-18T14:34:50+00:00\">March 18, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-293 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/03\/03\/journal-entry-week-8\/\" target=\"_self\" >Journal Entry Week 8<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The Media\u2019s Influence on Our Understanding of Cybersecurity The media plays a huge role in shaping how we perceive cybersecurity, but I think its influence is often a double-edged sword. On one hand, news outlets, movies, and TV shows bring awareness to cyber threats, making people more cautious about online security. Major data breaches, hacking&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-03-03T18:51:07+00:00\">March 3, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-289 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/02\/25\/journal-7\/\" target=\"_self\" >Journal 7<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The meme I created illustrates the challenges someone might face while working in a cafe, which ties into the Human Systems Integration framework. In the meme, the individual experiences frustration due to technical issues, like Wi-Fi disruptions, and the potentially distracting environment, represented by the &#8220;spying&#8221; coffee. This highlights how the design of a system&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-02-25T01:06:59+00:00\">February 25, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-284 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/2025\/02\/17\/journal-for-week-6\/\" target=\"_self\" >Journal for Week 6<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Spotting Fake Websites Today I challenged myself to identify and compare fake websites with their authentic counterparts. I examined three examples and noted the subtle discrepancies that revealed their fraudulent nature. 1. Example 1: Fake: www.goggle.com Real: www.google.com Observation: The fake site transposes letters by using goggle instead of google This slight misspelling can easily&#8230;&hellip; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-02-17T19:31:52+00:00\">February 17, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29179,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/pages\/345"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/users\/29179"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/pages\/345\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/pages\/345\/revisions\/365"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ekoscinskieportfolio\/wp-json\/wp\/v2\/media?parent=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}