Article reviews
International Journal of Cyber crime
The impact of Cybersecurity and AI related issues.
Garrett Finch
10/1/24/
CYSE 201
The article that I chose was the international journal of cyber criminology and I found this article interesting on how it can be directly related to a lot of different things in the cyber world. I believe that this can be directly related to all of the different social sciences that we have talked about, and it says in the article how it can all be used in all of the different fields and how all the research that we can use can be utilized in so many different social sciences. The hypothesis of the article is to showcase feedback for employers and employees and to see how they deal and feel about the risks of AI in cybersecurity. It was also used to add new policies and practices for companies and employees to try and use for a more secure work environment. The journal has different research methods that were mostly research surveys and samples for analysis from their employees to see how they do everything under variables under investigation. The different types of data and analysis that is performed in this journal seems to be mostly descriptive statistics that they gathered through surveys and reported issues that deal with impact of AI on cybersecurity. The concepts from the power points that we talk about and read in class are based on how this stuff is used every day and how what we talk about every day in class is utilized and practiced by companies everywhere. I also find it interesting how some things that we talk about in class that seem like common knowledge are issues for companies that they deal with like the safety or their companies and how having everything secure is so important and to teach safe practices to their employees that seems like common sense. The topic that I chose can be directly related to concerns or challenges to any company especially as AI seems to be more advanced than ever and it will only improve, and it will force companies to have better security and more secure networks for their data. I believe that this article is very helpful and very important not just people in the cyber world but people all over the world because if you are careful with your information or fall for a fake scam from AI or a phishing email or something like that it can be very bad for you and people around you even if they did not participate in what you did it can still happen to them. This article to me was very helpful that helped me understand the concepts of AI and the importance of being safe and secure must not as a person as a whole company and how important it is have cyber security measure and practices in effect and also how it can all be tied into so many different social sciences at once when it seems simple but it so just way more complex then you could ever think it could be.
article review 2
Career paper
Garrett Finch
11/17/24
The article I chose was the international Journal of cybersecurity of intelligence &
cybercrime. The article can be directly related to the social sciences of cybersecurity
because it’s a journal that helps people search things up and answer any questions or
thoughts that they might have. The journal can help related to any questions or hypothesis
that anyone might have about anything going or any social sciences questions and the
journal overall can be helpful for anyone who is curious. The types of research methods in
this journal are mainly either vlogs or journals about a topic done through extensive
research and surveys as well are research methods in the journal as well. The types of
analysis done in the journal and other entries are mainly just research and questions a
data received from surveys and things such as that too collect data to analyze. The
concepts from the journal and all things talked about in the journal I chose can be directly
related to the slide shows we talk about in class because it is all kind of formatted the
same way with how the information is shown and it also gives us references on where they
come from and how the data was received and analyzed to gather the information being
talked about. Every single topic that you can ask about can be directly related to
challenges and contributions of marginalized group work because it shows how everything
can coexist together and gather information to help others understand and learn to gather
more information to spread for more people all around the world to understand and learn a
valuable skill from it as well. Team works and group projects are a very big thing in the work
place and it shows that everyone should work together and try their best to be a part of a
team and to be a successful team also. The overall contribution of these studies to society
are very beneficial because for one it gives out more important information that other
people can comprehend and learn to help themselves understand more about cyber
security and cybercrime which is a very important part of our world today and it can also
help others who aren’t in the field learn more as well and that is a huge contribution overall
not just for cyber security and cybercrime but for everyone around the world with the
dangers of cybercrime and cyber criminals.
References
https://vc.bridgew.edu/ijcic/
- Career paper
- Garrett Finch
- Cyse 201S
- Today I will talk about a specific job in the field of cybersecurity and how it can be directly related to social sciences. The job that I will talk aboit is penetration testing and I will talk about how it can be directly correlated to social sciences and other human factors as well.
- Penetration testing is different than most jobs in the cybersecurity field because there are more real-life aspects that come forward to use and how it can be used outside of an office and really anywhere in the world. One is the understanding of human nature and elements in cybersecurity. In the real-world field, there are so many things that you must take into consideration in penetration testing especially in a real-world experience because you must know how and physically to check into things but also mentally and physiologically as well and to understand human behaviors. The main point of penetration testing paying a company or group of people to try and ethically hack into their systems and find any vulnerabilities or weak points in their systems and then the testers tell them what they need to improve on and how to prevent things going bad for the companies. It is especially important to understand the human elements of cyber security when doing this because you’re basically trying to trick people into thinking or doing something they aren’t supposed to and, in many times, when they are trying to prevent you from doing that exact thing. It’s also important for the testers to be strong mentally because they will have to make fast, quick and dangerous decisions on the fly as well.
- The next thing I will be talking about is the focus of social engineering in penetration testing and how it is used. Some examples of how it is used are phishing, impersonation of someone they might work with, smishing. The main goal of these practices is to test and find a weakness or a weak point in a person or group and to see how they can fix the weakness and to stop it from happening again. These practices are very important to any company out there and they should be tested to try and be as safe and secure as possible. The phishing and smishing attacks are kind of similar in a way phishing is mostly sending out corrupted emails to trick users by giving up vulnerable information and smishing is the same exact thing just with text messages of websites and things that are used to gather valuable information on somebody. Those are some examples of how social engineering is in play for penetration testing and how it is used.
- Now I will talk about the last and what I believe is the most important part of penetration testing and it is the ethical hacking part. The ethical part of penetration testing is the most important because it is basically stating that when they are trying to hack into a company’s systems, they will not cause any harm or leak any information or anything that they will do everything ethically ensuring safety. It is a very crucial part because when they are hacking into a company’s software or systems and they succeed instead of taking the information and blackmailing them they tell the companies what they are doing wrong, the weaknesses that they have and how it can be resolved and everything can be mitigated through the ethical element of penetration testing. That to me is why the ethical part of penetratio0n testing is the most important thing of all that I talked about today.
- In conclusion today I talked about what I think are the three most social parts of penetration testing and how they are used and how they are all effected by social sciences and tied into everything as one.
- References
- https://www.coresecurity.com/blog/human-element-pen-testing-and-role-tools-can-play
- https://purplesec.us/learn/social-engineering-penetration-testing/
- https://safecomputing.umich.edu/protect-the-u/protect-your-unit/vulnerability-management/ethical-hacking
Journal entries
Journal entry one
Some things that interest me from the NICE frameworks are the cybersecurity workforce management and I find that very intriguing to me because it kind of deals with a lot of different things and components that a company has to offer so I like it because one I don’t think it will be boring because there are so many different components that re involved in it. Another thing that I think I would like about is that you have to have good problem solving skills and you just also be able to think outside the box and be creative so you can try to make everything work for everybody because no one is the same and every single person you work with will be different. The one that appeals the least to me is the programming auditing because that is a lot of reading which seems boring to me.
Journal entry two
The principles of science can be directly related to many things but I am going to talk about how it can be specifically related to cyber security. The principles of science can directly associate with cybersecurity by providing structure and frameworks to follow and to also look at things in a different point of view than it would normally be seen as. Social sciences are also very helpful and are used often in the field of cybersecurity by being used to help conduct research such as case studies and surveys are very helpful as well. The sciences can also give us a better understanding of why someone or a party is doing what they are doing and why by using sociology or phycology these two can be very helpful in the world of cybersecurity.
Journal entry three
Privacyrights.org is a website that shows public information for data breaches and gives you statistics and a deeper dive into what happened to the data. I believe that it can be very helpful to researchers because this information can be used in a very good way because it shows what went wrong and how everything happened. It can be helpful to the researchers because they can learn from the mistakes that the other companies and people made that led to there breaches or hacks and see how all the things that went bad can be solved and they can help further prevent the issues from reoccurring again. It can be very helpful to learn from mistakes and fix any issues so what happened to others won’t happen to them.
Journal entry four Maslow’s hierarchy is a very interesting thing that is about humans and what they need to live and I will be talking about how this same hierarchy can be related to technology. In the hierarchy chart they were 5 different levels physiological needs, safety needs, belongingness and love needs, esteem needs and self actualization. These are very important in todays world and it these 5 things can be directly related to technology. Many can assume technology with safety needs because you can call for help with your device so that can be related. Physiological needs can be related to just having your phone as a something with you all the time. The belongness and esteem needs are the sense of having your device and not being able to talk to your friends or see pictures of yourself for a sense of self esteem. The self actualization can be related because you can do so many different things on your phone with so many different people all over the world.
Journal entry five
Out of the seven motives listed I will conduct a list of ranking them from one the most important to seven the least important. The most important motive to me is revenge because I feel like this one is the most common because a criminal or a country could feel like they were slighted or disrespected and so now they want to get some revenge and cause harm to a nation or others. The second most important one to me is money because a lot of money can persuade some people to do some pretty bad things for financial security. The third one is political because I feel like they do it to gain political power or to prove the political figure they are going against is bad and they would do it for there country. The fourth most important is for multiple reasons because anytime you hack something or do a crime you should have somewhat of a reason to do so. The fifth most important to me is for entertainment because if you do it for entertainment you are doing it because you like to make people suffer or to see things go bad for a person or a country. The sixth most important thing to me is boredom because I feel like a true cybercriminal or a powerful country has more things going on then to be bored and hack something just for fun. Lastly the least important thing to me is for recognition because I feel like if I was a cybercriminal or I just did a cybercrime I would not want to be recognized for it I would want it be a mystery.
Journal entry six
I will be identifying some fake websites and the first one is Omintages[.].com and this website is fake because for one the URL and it has a low rating and it looks very fake and not very trustworthy. The second fake website that I identified was sheingivesback.com and this website is one not a real website for Shein and another thing about it how fake and suspicious the website and URL looks. The third and final website that I identified was waslofficial.com and this is a fake Walmart website because for one this is not the official website and the URL if you just have common sense you can see that is not actually Walmart.
Journal entry eight
From this video there are many different takeaways and things that you can get from the video. In the video it shows many different scenes from movies and tv shows and she talks about if they are accurate or not. I think that what she said and kind of just keeps building on the entire video it seems that some of the tv shows and movies can be accurate in some ways and it can be realistic, but most of them are a little unrealistic and makes things seem easier and more simple than they actually are in real life like making something that is very complicated in real life just easy in the sow or movie. The thing that I gathered from this video overall is some of the stuff is accurate in a way but it the grand scheme of things its not really accurate at all.
Journal entry nine
From the social media scale above my score was very low because, while yes I use social media I don’t revolve my life around it always think about it. I really would say that none of the questions in the scale for me were true because while social media is useful and cool it’s not real life and you have to live in the moment and not revolve your life around sharing thigs with other people. I use social media but mainly for sports and media not to share things with people, so it does not take up most of my time and I think that it can be addicting for some people because they care about other peoples opinions and how others see them, but that is not the case for me so I don’t really use social media like that and it does not have an effect on me.
Journal entry ten
This journal was very interesting to me because it talks about how cyber security is kind of
turning into a sub domain of national security and how important it is now. The journal
talks a lot about things that I have previously learned in my classes with the safety
protocols that we should implement and the importance of good cyber security measures.
It also showcases how other countries and criminals can use it to attack and cause
problems for people all over the world and really adds some more emphasis on the overall
importance of cyber security and how it is becoming such a big thing worldwide now and
not just in America it can affect and every business out there and can lead to bad thing
happening to them that are very expensive to resolve. This article overall to me is very
interesting because it tells me and shows me what I have bene learning about is still
important and how if it does wrong it can affect people in a very bad way and emphasizes
the importance of cyber security to me.
Journal entry eleven
A cyber security analyst can work anywhere and everywhere really because it is an important job and it she talks about many different thing do9nvolving cyber security and the good things that can bring with along as the bad things as well. She talks about the salaries and how you can make good money anywhere but it also depends on the price of living where you live as well and she talks about how you can work wherever and travel the world while working and the importance of a good resume as well can be very helpful for any job but especially a tech job. She also talks about how to become a cyber security analyst as she kind of breaks down all the different ways you can get into the field in so many different way, she says a degree is not needed but it is helpful for sure.
Journal entry twelve
In the journal that we read I will be explaining how two different economic theories and two
different social sciences can be related to the letter. One economic theory that can be
related to this article is the Keynesian economic theory that basically is just the
government enforcing and helping companies enforce better cyber policies which
definitely could have helped in this case, another theory could be the Laissez fare theory
because this one for sure could have been used and helpful to the privacy and safety to the
company. Some social science theories that could have been used and relate to this
article are the social learning theory because while mistakes were made, they can
definitely be learned from and you can correct and help resolve any issues ever happening
like that to them again, another theory would be some sort of social analysis and run a
survey in the company and see what people need more cyber policy practices and see
what others are don good and to see how the whole company and individuals are doing
overall as one in cyber safety and protocols.
Journal entry thirteen
So basically, the article about hacking for good is just talking about everything really that
ethical hackers do and the policies that they follow and things they do help others as well.
There are a lot of polices and protocols that are in place to be followed and I feel like they
are all very important to the overall structure and path that they ethical hackers follow to
help ensure hacking thing safely and to help show what’s wrong and led them to be able to
hack the system or whatever they are getting paid to penetrate. It can also be showed in
the article that when the hackers penetrate the systems and do what they are being paid to
they just don’t take the money and leave they show how they hacked the systems and what
can be done to prevent them from doing it because there is always the chance that non
ethical hackers could hack the systems and cause a lot of problems that are expensive
and not easy to fix and they won’t tell you what you are doing wrong and how to fix it they
will just take information ad go with it. That is what I gathered from this article on ethical
hackers and the protocols that they follow and that are in place for them.
Journal entry fourteen
The article shows eleven things that we do online that are illegal and today I will talk about the five most serious things we do unknowingly. The most serious thing to me is probably faking your identity online which is pretty serious because there are many different ways it can go bad, the second most serious thing to me is collecting information about children because there are so many different ways that it weird and wrong in a lot of way, the third thing is illegal searches on the internet because there are reasons its illegal to look something up that is illegal so why look it up knowing its illegal to begin with, the fourth thing is sharing passwords and others with people its not bad if you truly trust someone with your information who is your friend but if its a random person then that is and and can leave to a lot things that wont be good, the final and fifth thing to me is recording calls without consent because that is an invasion of privacy and can leak information and that is illegal and wrong also because that can also lead to a lot of bad things as well.
Journal entry fifteen
The digital forensics investigator can be related to social sciences because of how they think and the way it is used. It also uses the understand of human behavior and how humans think and behave in certain situations and it also uses social and digital interactions between people to see what there intentions and actions were, it can also be important when analyzing data from social media to see how the interaction was and also the understanding of how what they are doing can effect there digital foot print and follow them for the rest of there lives and how it is important to have good digital footprint and cyber etiquette