HW
Journal Entry 4
Name: Elizah Taylor
Physiological Needs Technology can also put restrictions on our most fundamental physiological needs, as it has become evident when it comes to food and health.
Safety Needs Today, technology has even become a part of personal safety. For example, the system that requires you to enter a code after entering your username and password (Two-factor authentication, 2FA, Two-step verification—it verifies both your identity and password before allowing access to sensitive information remotely) secures online accounts such as online banking accounts and one’s personal information.
Love and Belongingness Needs Feeling is still important though in a sense from modern technology’s media. Instagram, Facebook, and Snapchat are examples of ways in which people can share real-time feedback online that they might not have received otherwise (Fang, 2013).
Esteem Needs Personal accomplishment; a technologically built sense of personal achievement exists. Somebody might even be awarded the title “maker” for handing out free programs; people can say they are the premier expert in their field because they show off supermodels on instant message platforms or get other kinds of recognition online. Narrating your resume on the Internet in such expressive terms is a conventional way to court applause and promote career-building stories.
journal 6
1. PayPal-secure.com
Type: Phishing site impersonating PayPal.
Red Flags:Suspicious Domain Name: The domain closely resembles the legitimate PayPal site but includes the word “secure,” which is a common tactic to deceive users.
Lack of HTTPS: The site may not use HTTPS, indicating an unsecured connection.
Poor Design and Content: Often features low-quality images and generic content.
2. CheapFlights-Deals.com
Type: Fake travel booking site.
Red Flags:
Too-Good-to-Be-True Offers: Advertises unrealistically low prices to lure users.
Unconventional Payment Methods: May ask for payment via wire transfer or gift cards, which are harder to trace.
Lack of Contact Information: Often lacks clear contact details or customer service information.
3. Support-Microsoft.net
Type: Impersonates Microsoft’s customer support.
Misspelled Domain: Uses a domain that closely resembles the official Microsoft site but with slight variations.
Unsolicited Contact: Often reaches out to users via email or pop-ups, claiming to offer support.
Requests for Remote Access: May ask users to grant remote access to their computers, a common tactic for scams.
journal 7
Photo 1 — “Grind now, shine later… but lowkey tryna finish this ASAP 😅” How does this relate to Human-Centered Cybersecurity? This is a testament to the kind of real-world pressure people feel to get things done fast, and how that can cause them to skimp on security — things like reusing passwords, skipping software updates or ignoring warnings. Human-centered cybersecurity acknowledges this
Photo 7 – “Friday hit different when the week dragged you but you still made it — jumpin’ for joy like we won the lotto! 🤣” Relation to Human-Centered Cybersecurity End-of-week fatigue can result in lapses in attention and judgment, like clicking on phishing emails or forgetting to log out of accounts.⸻
Photo 20 – “Casually scrolling for shoes I don’t need but definitely deserve 😋” Relation to Human-Centered Cybersecurity Online shopping is a very popular activity and one that can easily expose you to threats, such as fake websites or data theft.
journal 8
name : Elizah Taylor
After watching the video “Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?”, I was struck by how far removed Hollywood’s portrayal of hacking is from reality. The media often paints hackers as either ultra-genius loners typing at lightning speed in dark rooms filled with glowing code or as chaotic villains who can bring down entire systems in seconds with a few keystrokes. While it’s entertaining, it sets up a wildly inaccurate perception of what cybersecurity and hacking actually involve….
journal 9
2-5 indicates risky usage
I definitely agree with some of them items and recommendations because they actually are very true for someone else if they are definitely into social media and let the media run they life . Human beings must have similar requirements–houses or other dwellings, food, society, spiritual living.Expanding on content: Many solutions used to meet these requirements (think the pyramids or stories of flood myths) reappear throughout history in different places later on. Different societies in the same kind of climate often develop similar techniques. Thus, desert civilizations dug irrigation canals, while river valley farming concentrated on flood control. Cultural Diffusion: People have always moved around, whether through trade or warfare or immigration. As one example, the Silk Road conveyed technology, religion and ideas—artistic or otherwise—throughout East and West. Human beings are natural meaning finders and pattern-makers.
journal 10
The authors characterize social cybersecurity as a diverse area of study that integrates aspects of political science, sociology, communication, psychology, and computational social science. They emphasize the role of technology in allowing both state and non-state entities to swiftly manipulate the global landscape of beliefs and ideas, effectively turning information warfare into a strategic instrument that can undermine trust in national institutions and core values.A particularly notable aspect of the article is the idea of “cognitive hacking,” in which adversaries employ technology to shape human behavior and societal norms, rather than focusing solely on compromising information systems.
journal 11
A number of social themes emerge from Nicole Enesse’s presentation about the function of a cybersecurity analyst, all serving to underline how important interpersonal skills are here. Communication is the first of these themes, because analysts must be able to accurately explain complex technical information to non-technical staff. This means that they have conduct thorough explanations and provide an intelligible account. Collaboration is another important consideration. The security analyst has a very close working relationship with many departments throughout the firm – IT, HR and so on – in order to activate protection measures when threats come and teams up some members from his own team onto another department’s staff so that it can take shape as projects.
journal 12
According to this theory, people make decisions by comparing the benefits and costs to maximize their personal benefit. Within the framework of the data breach, a police site comments that company’s choice to postpone advising customers until after law enforcement finished investigating conveys some kind of calculated decision which will surely limit fallout and preserve its own good name. When customers finally get such a message, they will also be anticipated (in their right minds) to rationally make decisions–e.g. contacting their financial institutions or keeping an eye on their accounts–on the perceived utility of these actions in protecting their privacy. Moral hazard arises when one party is shielded from risks by another and thus may act in a way that’s more risky than if he had been bearing the risk himself. So it is a moral hazard scenario in this case that the third party platform C did not promptly discover the breach and supplier B late gave notice to customers. The company and its provider did not bear the immediate consequences of the breach, potentially leading to less urgency in addressing issues and informing those affected.
journal 13
The bug bounty’s principal value comes from that it plays complementary function with traditional security moves in discovering hostilities could well be missed by aforementioned measures. The review also says that such programs offer enough liberities to any company which counts cost-efficient preventive measures among its wishes. Therefore, bothsmall businesses and fortune 500 firms can get security checks alike done on their systems. Nevertheless, the review points out that there is a lack of empirical research. In particular, there are no known factors which influence the number of valid reports received by companies. Nor are we sure how program characteristics affect their The data shows that hackers have quite low price elasticity (between 0.1 and 0.2), suggesting that non-monetary incentives like reputation and personal satisfaction are significant factors in their participation. The study finds that the size and brand profile of a company do not make any appreciable difference to the number of reports it receives. This contradicts the hypothesis that larger or more prestigious companies are more attractive to ethical hackers.