CYSE 201S – Journal Entry 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

There are a lot of resources that can be gained from studying data breaches. For one, data breaches provide information on what kinds of organizations get targeted the most. This allows for cybersecurity protocols to be pushed their way and for things to overall improve. Furthermore, this applies to the types of breaches that happen in any organization and how they can be combated as well.

Second, the information can be used by researchers to propose new cybersecurity strategies and policies, improving quality and security. If the available data shows a continual problem, and the policy in place isn’t providing good results, then new perspectives could offer a difference.

Finally, data breach information can be used to inform the public about the reliability of the companies they care about. This will either form, reaffirm, or break the trust between consumers and companies; regardless, it will improve cyber hygiene and knowledge about cybersecurity for everyone.

In summary, the information from data breaches can provide several types of outcomes for companies, people, and policies. Funding for cybersecurity can go toward companies that are struggling in that department. New cybersecurity protocols can be introduced to counteract and mitigate common cyber-attacks. People can not only be informed about how trustworthy companies are but also learn how to protect them regarding cybersecurity.

CYSE 201S – Journal Entry 2

Explain how the principles of science relate to cybersecurity (Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, Determinism, Skepticism).

All principles of science relate to cybersecurity in a multitude of ways. First, relativism relates to cybersecurity because of society’s interconnection with technology. Almost everyone on the planet has a form of technology with them at all times, many systems are in place that have technology as a foundation, and it’s in every single business of this age. However, all of those technologies need to be properly secured, hence the relation to cybersecurity.

Second, objectivity is useful in cybersecurity studies for finding answers to questions that can form strong opinions. Furthermore, it prevents research from being muddied and paves the way for use and new policies in business, government, and other systems.

Third, parsimony applies to cybersecurity’s educational side by simplifying its complexities. Simplifying answers and topics allow students and the general public to learn more quickly about cybersecurity and develop better cyber hygiene.

Next, empiricism helps cybersecurity research and study via empirical reasoning and evidence to further understanding. Statistics and data are good ways of assessing which areas of cybersecurity need to be targeted.

Following, ethical neutrality is necessary for addressing issues that involve cybersecurity. Systems that are put in place to prevent crime are helpful on paper, but it’s just as important to look at the human side for a real sense of justice and whether it’s ethical. Furthermore, it’s important in knowing how forms of security encroach on the right to privacy.

Next, determinism is more related to cybersecurity’s cybercrime aspect due to why people commit it. Finding answers to human behavior and action is necessary for making an impact on cybercrime and mitigating its prevalence.

Finally, Skepticism is an extremely important tool for cybersecurity because of how it evolves the concept. As technologies and systems advance daily, people are working harder and harder to crack into them. This means that cybersecurity strategies have to be constantly reinvented and updated to keep up.

CYSE 201S – Journal Entry 1

Review the NICE Workforce Framework. Are there certain areas that you
would want to focus your career on? Explain which areas would appeal
the most to you and which would appeal the least.

Workforce Framework for Cybersecurity (NICE Framework) | NICCS (cisa.gov)

The NICE Workforce Framework is a well-packed and well-done resource for leaning about the cybersecurity workforce. The categories provide a variety of careers, and the descriptions are concise and detailed about the necessary skills and knowledge. Some of the areas that I want to focus on for my eventual career are Maintenance and Development. I plan to have a career in software development and these general areas could give me some insight into how everything will work. Moreover, it provides a creative outlook for me as the process will never be the same

A few of the specialty areas that appealed to me were Software Development, Systems Development, and Systems Administrator. The reason these areas appeal to me is that they allow me to experiment with systems to see how they work.

The specialty areas and categories that didn’t appeal to me were Cybersecurity Management, Executive Cyber Leadership, and Digital Forensics. They don’t appeal to me because I don’t see myself being able to fulfill the role of leader efficiently.

CYSE 201S – Scams and Routine Activities Theory

Watch this video and explain what it has to do with routine activities theory.

This video shows how effective routine activities theory can be regarding scams. Scammers take advantage of both the platforms people are used to and the time when deals that are too good to be true are commonplace. Furthermore, people that use online shopping may not be aware of the dangers of putting banking information online or how risky some deals are. This leads to high cybercrime during Black Friday because cybercriminals will always follow the money.

CYSE 201S – Cybercrime Victimization Reporting

Why do you think individuals don’t report cybercrime victimization?  Describe your views on the topic.

There are many reasons why people don’t report on cybercrimes. For one, they may not have an understanding of what happened, whom to call, and what to do about it. Alternatively, people that may know won’t want to out of embarrassment or possible danger that will come to them or the people around them. In addition, it could affect their reputation or how they’re seen. Finally, when individuals think about the scope of the internet, they may feel like it’s pointless to try to report on it in the first place. These are some of the many reasons why people aren’t inclined to report on cybercrimes and how it leads to the dark figure of crime.

CYSE 201S – Cybersecurity Cultures

Watch this video about a 12-year-old cyber security expert.  Pay attention to how he has embedded himself into the cybersecurity culture.  Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise. Talk about how the video relates to something you read for this class – either from the readings or this module.

This video relates to the module via the hacker and professional subcultures of cybersecurity and how culture can create cybersecurity behavior. With Reuben, he has parents that are a part of the tech industry, and they influenced him to be interested in cybersecurity. Furthermore, being a digital native makes him more informed about technology and cybersecurity. This knowledge shows how he’s part of the hacker subculture when he was able to hack and get into a profile using public Wi-Fi and when he said that he would never use public Wi-Fi unless he were entirely sure it was safe, showing skepticism. These behaviors in the video show how the subcultures of cybersecurity play a part in people’s interest in the topic.

CYSE 201S – The “Human Firewall”

Watch this video and pay attention to what the biggest risks of cyber threats are.  After watching the video, describe what you think about the “human firewall.” 

The human firewall describes the precautions that people take to protect themselves from cyberattacks. This can be in the form of changing passwords frequently, being skeptical of deals on the internet, and knowing about basic cybersecurity information. Based on the video, the human firewall needs to be acknowledged at every level because of how it relates to everyone, not just IT. Organizations need to put a better foot towards this issue and other cybersecurity concerns. With how the biggest factor that leads to cyber victimization and attacks being human error, it’s critical that everyone is informed about the human firewall to better the security of all outlets of information.

CYSE 201S – Victim Precipitation Applied to Cyber Victimization

Answer the question: “Apply the phrase victim precipitation to cyber victimization.”

Victim precipitation is a theory about how the factors that lead to someone being victimized are shown through characteristics and cyber victimization is the act of someone being victimized in cyberspace. These two terms are linked because victim precipitation is crucial in determining the types of cyber victimization. Things like spending large amounts of time online, going onto risky websites, and having poor netiquette are characteristics that lead to cyber victimization. Other characteristics such as poor cyber hygiene, using the same passwords, or falling for scams can also lead to forms of cyber victimization.

CYSE 201S – Determinism and Computer Hacking

What do you think about the principle of determinism as it relates to computer hacking?

I feel that determinism is a significant factor in why people want to hack technologies. There are many influences on why someone would choose to be a hacker such as a rush of emotion, feeling a sense of freedom and anonymity, or someone trying to make a statement. However, despite other factors being deterrents, and hacking across the Internet being known as a bad thing to do to someone, people still choose to be hackers. At that point, reasoning can be traced back to early points in life to determine behavior. In summary, determinism should at the very least be considered a slight factor as to why people hack or even commit cybercrime.

CYSE 201S – Social Science Careers

Describe the top three careers of social science graduates that you would be interested in considering. What is it about those jobs that you find interesting? 

The first career that interests me is a sociologist. Their job is to study society, behaviors within it, the cultures surrounding it, and human interaction. I’m interested because it would be a great way of learning about the culture and how it shapes and impacts people.

The next career that interests me is a psychologist. Their job is to research and study human behavior. They also manage disorders and the mental health of patients. It interests me because I would be able to understand the complexities of the human mind. 

The last career that interests me is a designer. Their job is to create visuals and graphics that serve a purpose. It also spreads over a large field of roles which include graphic design, interior design, fashion, and even web design. I’m interested because I would get the chance both to express myself creatively and even get paid for it.