Journal Entry’s

Journal Entry #1


Q: Review the NICE Workforce Framework. Are there certain areas that
you would want to focus your career on?

A: After reviewing the NICE Workforce Framework, there was one that caught my eye. The one that caught my eye is viruses. I wound want to focus on viruses because it is a problem since the beginning of the World Wide Web. So that means that viruses are constantly evolving and that is what intrigued me because as soon you solve how to defeat a virus there will be a new virus and new challenge.

Journal Entry #2

Q: Explain how the principles of science relate to cybersecurity

A: Principles of science relate to cybersecurity very well. For example in science and Cybersecurity you will have to test and create hypothesis. You will treat a test in cybersecurity like a experiment in science. You will conduct a hypothesis and test is it true or not.

Journal Entry #3

Q:Visit PrivacyRights.org to see the types of publicly available information
about data breaches. How might researchers use this information to
study breaches? Enter a paragraph in your journal.

A: PrivacyRights.org is a great sight to access information about data breaches. But researchers will use this sight and use the information the best way they can. One way that researchers will use this information and sight is to see where and which state have the most data breaches. Then the researches will use that information and incorporate that to help the places with the most data breaches.

Journal Entry #4

Q: If attended COVA CCI CyberCon, choose a presentation you attended,
(separate from what you chose from Discussion Board) and explain
what you did learn, how it relates to cybersecurity and social science.
(Provide the title of the presentation)

A: When I attended the COVA CCI CyberCon I learned a lot. Not with just cyber security as a whole. But I learned how social science can translate to cyber security. It thought me how it goes hand and hand with each other even though it does not see like it will. It thought me a lot of stuff about social science that will help me and every person that is in the cybersecurity field. That will help make there job more easy.

Journal Entry #5

Q: Identify which theories you think best explain cybercrime and discuss what you like about that theory.

A: While going over all the theories that are out there. I believe that there is only a few that truly explains what cybercrime is. The theory that I believe fits cybercrime is is behavioral theory. I say that behavioral theory fits cybercrime the most because I believe to be involved in cyber crime and to partake in cyber crime you have to learn it before hand. Cyber crime is not something you can just know off the bat one day. You actually need to be exposed to it by someone you know personally, or be involved on online activities that can can lead you in a path of cyber crime. That is why I believe that behavioral theory is a theory that best describes cyber crime.

Journal Entry #6

Q: Can you spot three fake websites and compare the three fake websites
to three real websites, plus showcase what makes the fake websites
fake?

A: There are a lot of fake websites out there in the internet with the horrible intent to scam or phish. The three ways to know if it is a fake website is by Bad grammar or spelling, The URL, and the contact page.

Journal Entry #8

Q: After watching the video, write a journal entry about how you think
the media influences our understanding about cybersecurity

A: The way hacking is portrayed in the media is all wrong and glorified. They portrayed as something easy and something dark. Also they portray hacking as only a few people in the world can do it. But that is false. There are many people out there that can hack and are also targeting you not just governments and big companies.

Journal Entry #10

Q: Read this and write a journal entry summarizing your response to the
article on social cybersecurity

A: This article was very informative and thought me a lot about cyber security as a whole. It thought me how nations use cyber security and cyber warfare. Plus it shows and teaches the reader about cyber threat and the concern of homeland security.

Journal Entry #11

Q: A later module addresses cybersecurity policy through a social
science framework. At this point, attention can be drawn to one type
of policy, known as bug bounty policies. These policies pay
individuals for identifying vulnerabilities in a company’s cyber
infrastructure. To identify the vulnerabilities, ethical hackers are
invited to try explore the cyber infrastructure using their penetration
testing skills. The policies relate to economics in that they are based
on cost/benefits principles.

A: As technology evolves same with cybersecurity. Companies are creating creative ways to use incentives to ensure workers to get work done. One way they are doing this is making “Bug Bounties”. This helps out cyber security workers help get money and find bugs. So if you don’t know what a bug bounties is it is basically if you find bugs in a software you will get paid or get a bonus just for finding the bug in the software.

Journal Entry #12

Q: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

A: After review the article that was given the violations are very serious. Like one example of a violation is faking your identify. I that is a major one because if it is illegal in real life it should be illegal online as well. It should be a violation because faking you identify is a bad thing in general because it is important to know you are at all times and it being online should not counter act that and many things online.

Journal Entry #13

Q: Why do you think individuals don’t report cybercrime victimization?

A: The reasons on why people do not report cybercrime is for many reasons. One of the reasons is that a good portion that have been victimized are unaware that they in danger or have already been attacked. This is due to them not knowing what to look for if been victimized or the lack of knowledge of cyber crime and cyber laws. Then the next reason on why people do not report cybercrime is because they will think since it is part of the cyber world they will believe that the attack is something small and not a big deal. That is why I believe people do not report cyber crime if a individual is a victim of cyber crime.

Leave a Reply

Your email address will not be published. Required fields are marked *