Week 1 – One of the fields that seems really interesting to me is the cybersecurity legal advice field. I have always found things to do with legal advice interesting and tying it together with Cybersecurity is something I would love to do. The field asked that you come into it with skills like performing risk assessments and I have always been very good at risk analysis and management. There is also a field I think I won’t like and that is Technology Portfolio management because I don’t want to be responsible for someone else’s money while investing in the technology sector is fluctuating market. It also just does not seem that interesting to me.
Week 2 – The principles of science like the scientific method relate to cybersecurity because of the way the field conducts hypothesis on cyber threats and how to stop them the trial and error ways of cybersecurity almost makes it seem like you are running experiments on what might stop a cyber attack and what won’t. It’s the same as in science when you are running tests and experiments to see what might support your theories or won’t. The constant running of tests and back and forth of trial and error is one of the things cybersecurity and the principles of science share in common.
Week 3 -I believe researchers will use the information gathered about data breaches that have happened in the recent years to try and deter them from happening in the future. The best way to deter something from happened in the future is to bring together data on why it happened, how many times it happened and when it happened, that way people working against data breaches can recommend countermeasures no only for the public to help with there own safety but also for the businesses that allowed the data breaches to happen so that they do not happen in the future and are cut back on so data can be safe and secure.
Week 4 – I learned about the Maslow Hierarchy of needs in psychology class in high school the Maslow Hierarchy of needs is a pyramid that represents what motivates people from most to less influential in motivation. The pyramid can relate to technology for the bottom of the pyramid physiological needs like food and water technology can help you access these essential needs. for the safety part of the pyramid technology can provide safety with home defense like ring cameras. for the love and belonging part of the pyramid technology can help you find and connect with more people which can help you find love by expanding your scope. for Esteem needs Technology can help you show your achievements to the world and see how rare they might be. For the last part self actualization sites like youtube can help you find your interests and passions by seeing people do what you enjoy.
Week 5 – I would rank them like this political last because I think that is the least motivation one I don’t think cybercrime with a political happen motivation a lot. I would put entertainment and boredom 2 and 3rd to the bottom because I think they mean the same thing if you do something for entertainment then your doing it out of boredom. 4th I would go with revenge because people do commit crimes for revenge a lot in real life so people commit online crimes for revenge does not seem that rare to me. the top 2 reasons for me to commit these crimes would be for recognition and for money recognition can get you fame and doing something for money is very common in all fields.
Week 6 – ways you can tell if a website is real or not is the URL make sure the URL is spelled correctly. Another way you can see if a website is real or not is to check for user reviews on that website if they have reviews say that the website is legit and not a scam. Another way you can see if a website is real or not is with payment methods are you being forced to only be able to pay with things like cryptocurrency or types of payment that can not be refunded or traced back to the fake website.
Week 7-
Week 8 – I think the media influences the way people think about and understand cybersecurity in a bad way I think the media makes it look way more malicious then it really is. When hacking is displayed in movies a lot of the time it is someone trying to break into something or trying to steal something and that is not all hacking is. Sometimes hacking is ethical and is used to help instead of someone trying to get into a system to steal something. Media also always portrays hackers as people who are only doing it for themselves and put a bad image out there for them.
Week 9 – I scored a zero out of nine I really don’t use social media that much. I think the items on the scale make sense and believe that being addict to social media is a real thing. Just like a gambling addiction I believe people can become addicted to social media and start to neglect other things in their life’s. Both gambling and social both affect people’s dopamine responses and that is why they are so addicting. Different addiction patterns are found across the world because of what is accepted in society there are different rules and laws and that might change what people might susceptibility to.
Week 10 – entries 10 and 11
10. I agree with this article that information warfare is becoming more and more important in the time period we live in today. Information warfare has been going on for a long time now and has become endless struggle to control the narrative. Information can be used in a lot of different types of ways in war it can be used for reconnaissance or for creating division within a country with mass amounts of false information. The advancement of technology and fact the information warfare waged using technology does not have any borders and can be done remotely from across the globe will only make information warfare more important as time goes on.
11. the cybersecurity analyst job is a entry level job that is great for beginners that want a high paying entry level job that can be done from anywhere. The video states that getting the education required for this job can vary the video recommends networking and going to local churches and asking to help with there technology department to get some type of experience in the field to better your resume. Networking in itself is a social behavior were you interacting with other people to put yourself out there and build relationships with likeminded people usually in the same field as you.
Week 11 entries 12 and 13
12. Did not complete
13. Did not complete.
Week 12 entry 14
I feel like the 5th most serious violation on the list is illegal searches on the internet I feel like sometimes people can add context to the searches and not make them look that bad. the 4th most serious violation on the list is bullying and trolling and for this one I feel what matters the most is the severity of the bullying and trolling. The 3rd most serious violation on the list faking your identity online depending on how good someone is at it they can fake their identity well enough into making people think they are someone else and that can lead to real problems. The 2nd most serious violation on the list is collecting information on children I feel like only certain individuals that jobs might relate to kids should be able to do this not just anyone. The most serious violation is sharing people addresses, or photos of others or passwords sharing someone information to other people like there passwords can cause serious damage.
Week 15 entry 15
Digital forensics seems like a cool career to work in. The speaker says his pathway into the field was through IT so it seems its something you can get into if you work in a technology field. Digital forensics relates to the social sciences because it relates to criminology digital forensics Investigators identity and analyze digital evidence that are involved in crimes. It also relates to victimology because digital forensics investigator have to understand the way behind the crime and why it happen to this specific victim investigator often uncover information about the victim that sheds light on why they were targeted.