Journal Entries

NICE Workforce Framework

My main career focus is in vulnerability analysis. I’ve always been interested in finding the vulnerabilities before any breaches occur. I kind of see it as a race against the attackers to see who can get to it first, although I would have a disadvantage because I would need to fix it as well. I don’t think I would want to go into technical support though. There wouldn’t be an issue of knowing what to do and how to fix it; I wouldn’t want to deal with the customers on the other end. I currently work in retail and used to be a cook with an “open kitchen,” so I think I’ve done my fair share of customer service. 

The Relation of the Principles of Science to Cybersecurity

Principles of science play a big part in researching the impacts of cyberattacks on society, and releasing the data to the public. The main principle used to release data is parsimony. Parsimony is a principle that refers to keeping the explanations as simple as possible. The other principles focus more on the research itself. Objectivity and ethical neutrality are similar; objectivity refers to non-biased research and ethical neutrality refers to ignoring the ethical issues that relate to the topic. Empiricism refers to studying the behavior that is real to the senses. Relativism refers to the fact that everything is related. Two more principles are determinism and skepticism. Determinism refers to behaviors being influenced by past events and skepticism refers to being critical about research.

How Researchers Use Public Data

Privacyrights.org has so much information on data breaches. They have data about data breaches anywhere from where it happens to what is affected by it. Researchers could use the information on where in the United States of America data breaches happened and study why it happens in those areas so much. They could pose questions like, why is California the most data breached state in the U.S.? Another example would be: why has data breaches exponentially increased over the past decade? There is even more data on what industries are affected the most and even the chronological order of different data breaches.

Relation of Maslow’s Hierarchy to Cybersecurity

The basic or physiological needs for cybersecurity are the basic physical technologies. Some examples are laptops, mobile devices, and personal computers. The next step in the triangle is the security needs. These can be passwords or firewalls to protect your devices. The belongingness and love needs relate to social media or even texting and communicating through a device. Next is the esteem needs like feeling appreciated or accomplished. Some examples of this could be a large following on social media, getting the cyber job you wanted, and defending against a cyber attack successfully. The top of the triangle is self-actualization, and can relate to completing your goals, being promoted to CEO or founder, or getting cybersecurity certifications.

Motives

The motive that makes the most sense is financial gain because a lot of people want money and it’s a fast way to get it. The next one would be revenge because when someone feels disrespected or hurt, they can act irrational. The third motive would be political reasons. Some people can get very emotional about political topics and could act irrationally because of this. Number 4 would be for recognition because people like to be known. Number 5 would be for entertainment, some people might not find entertainment in other places.  Number 6 would be other reasons like to show off because they want to be known. Lastly is boredom because there are a lot of other things to do.

How to Tell if a Website is Fake

Fake websites are a major problem for unsuspecting people. The simplest mistake in the web address is one of the biggest hints towards a fake website. For example, one of the most common mistakes is an o replaced by a 0, like icloud.com or icl0ud.com. Another tell is a “fake” domain, and I have personally almost fell for this one. An example for this would be usa.gov and usa.gov.com. These two types of characteristics main focus on humans clicking too fast, not paying attention, or simply misreading the url. One last characteristic is a website that starts with http instead of https. Not every real website is going to have https, but it just means the website is more secure.

Three Memes Related to Cybersecurity

Source: Group of people doing jump shot photography photo

“We just got MFA!!”

When people use Multi-factor authentication (MFA), they are less likely to be hacked.

Source: https://unsplash.com/photos/person-using-macbook-pro-on-white-table-AvSFPw5Tp68

“Phew…now I’m safe.”

When people use VPNs, they are more protected from threats.

Source: https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg

“Time to get educated”

Employee training is a major aspect of human-centered cybersecurity to minimize human behavior.

How Media Influences Our Influence on Cybersecurity

This video gives great background information on what hackers actually do and see. Most of the shows or movies do not demonstrate what hackers see and do. Some of them have some good real life examples but almost all of them showed everything happening very very fast. Most of the time it can take days, weeks, months, or even years to hack into something but almost all of these clips showed them hacking into things within hours or even minutes. Although it would be nice to be able solve hacker problems that fast, it just isn’t very possible in this day and age.

Social Media Disorder Scale

I scored a 2 on the social media disorder scale, and have risky usage according to the scale. I don’t think this scale can fully tell you what level your social media risk is because most of the questions ask about the relationship you have outside of social media caused by social media. I think that in order to really understand your level of risk, you would need to ask more questions about the time on social media and the actions you make. People can have bad relationships outside of social media but still be safe when using it, as long as they are knowledgeable on how to be safe and not everyone has access to that knowledge.

Summary of Social Cybersecurity Article

With the rise of technological advances, we need to be more careful about our surroundings. In the military technology is used a lot more now, which is a good thing and a bad thing. The good part is that sometimes we could use drones or cyberwarfare to lessen the use of human troops in order to gain more information. The bad part is that the other countries can do that too, and the worst part is insider threat. We need to monitor our own personnel and to inform them as well as society to be careful of social attacks, as well as possible malware infections and how they work.

Cybersecurity Analyst

A Cybersecurity Analyst is basically the first line of defense to an attack. Your job is to monitor the systems and analyze them to make sure there are no attacks. Although, when you’re just starting out you are mainly a help desk type of person where you are just helping people whenever an attack happens with phishing or a different kind of attack. You mainly are dealing with just monitoring computer systems for any attacks and might sometimes deal with customers to help them recover from different kinds of attacks. When applying, the descriptions usually say you need 1-3 years of experience, but most of the time you can sell yourself without the experience.

Illegal Internet Actions That Most People do Without Knowing

I would say that bullying or trolling would be the most serious offense because of how much mental damage it can cause someone. Another serious offense would include collecting information about children. This is protected under the Children’s Online Protection Act, so it is a direct violation to that. The third serious offense would be illegal searches online. If someone is making an illegal search, then who knows what bad information they are trying to obtain. The fourth serious offense is sharing passwords, addresses, or photos of others. This can be very serious if the wrong person gets a hold of that information. Lastly, faking your identity online can be bad if you are using it to cause harm to other people.

A Way to Get Into Digital Forensics

He got brought up to being a digital forensic scientist through the ladder. He was originally an accountant, and started off in a smaller branch when one day they needed an IT person. So he thought he could get into it because he uses computers a lot. While he moved to being an IT person, he was still doing the accounting stuff for that company. This gave him the opportunity to move onto a bigger accounting company, and while he was in that company, he got an email about a new digital forensics team that was forming in Australia. He took the opportunity without even knowing what it was, and that is how he got into the digital forensics field.