Journal Entry’s
Journal 1
Several areas in cybersecurity particularly interest me. As I have been growing my
knowledge of cybersecurity and with the way the world continues to evolve, I have been
considering focusing my career in cybersecurity, specifically in the protection and
defense area. Insider threat analysis and incident analysis are really appealing career
paths to me because they are similar to ethical hacking. I find these careers fascinating
because they both help protect organizations by identifying threats and finding ways to
respond to them correctly. I also think it’s interesting that these careers work alongside
law enforcement to help and support them. The career that is least appealing to me is
technical support because I think it seems really repetitive and doesn’t catch my
attention.
Journal 2
The principle of Empiricism is the perception on which knowledge is understood.
The principle of Empiricism is that knowledge comes from real experience. The principle
of Empiricism in cybersecurity can relate to a wide range of data. For instance, test
results, threat attacks, and system logs. Empirical data collection and analysis are very
important in cybersecurity. Cybersecurity helps solve and create solutions worldwide,
drawing on real evidence of threats. Empirical data collection and analysis are
particularly beneficial in cybersecurity, given that attacks occur daily. This helps
cybersecurity professionals to analyze and learn from patterns of various threats,
helping to prevent them in the future. Overall, being able to constantly analyze data
improves security and helps identify vulnerabilities within systems and networks.
Journal 3
In today’s world, hackers cause a lot of issues and are pretty dominant in the
technology field. After reviewing the provided article, I learned that more than half of
these attacks are classified as unknown breach types. The other small percentage of
these attacks lacks sufficient information to determine the issue, making it difficult to
identify the attack method that was used. There are several forms of information about
data breaches that can be beneficial for researchers, such as reports, articles, and even
the press. Researchers can utilize this information to identify attack algorithms and
trends to prevent these cyber attacks from occurring, but also allow them to break down
the variety of attacks to categorize them. Over time, this will help prevent successful
cyber attacks and eliminate vulnerabilities.
Journal 4
Maslow’s Hierarchy is a theory founded by Abraham Maslow. There are five
stages of his theory, representing several different stages of human motivation. I can
relate to all of these levels in my everyday life, from my experiences with technology.
The first two stages I can relate to because I use technology to cook food every day,
and on my laptop, I have software’s to help keep my private information safe. I also
relate to the third stage because I use my phone to communicate with my friends and
family. The fourth stage is esteem needs, I experience this when I find solutions to
problems I’m having with technology. The last stage is very important to me; technology
allows me to improve my knowledge through various learning platforms.
Journal 5
After reviewing the eight motives provided and ranking them from most to least sensible, I believe that money is the primary motive for individuals engaging in cybercrime. Today’s world is highly driven by money, and it has a significant impact on individuals, influencing their decisions. The second motive I think makes the most sense is revenge. This is because revenge is a primary motive for many types of crime. When individuals seek revenge, it stems from different emotions, primarily anger and a desire for retribution. Politics is the third motive that makes sense to cybercrime. This is because individuals often justify their actions. After all, they think it’s what is right. The fourth motive has multiple reasons. I think this is a very common motive because individuals often have various reasons that influence their decisions. The fifth motive is recognition; many cyber offenders commit malicious attacks to demonstrate their power and boost their status. The sixth motive I think makes the most sense is curiosity. Curiosity motivates individuals to take things to the next level and encourages them to explore further. Entertainment being seventh is reasonable to me because I find committing cybercrime to be both fun and reckless. Finally, I think boredom is the eighth motive because I consider it highly unlikely to occur.