Journal #1:
With a quick review over the NICE Workforce Framework, the portion that interested me the most was the idea of Cyber Defense and Incident Response. I like these the most becuase they let me protect systems and give me the benefit of responding to threats that are created in real time, which includes mitigating risks and making sure systems are secure. I really like the specific idea of being able to be on the front lines and securing against real world threats. The areas that interest me the least are areas like software development in the security world and related areas. These interest me the least because I am less interested in coding and would like to use more hands on tactics.
Journal #2
The principles of science (Empiricism, Determinism, Parsimony, Objectivity, etc.) relate directly to the practice of effective cybersecurity tactics. Determinism focuses on the nature of cause and effect of cyber incidents which can help the professionals find the root causes of problems and create specified defenses. Empiricism focuses on more of an evidence-based approach, with the idea that cyber strategies are built on data at a measurable scale, with an example like system logs being common. Parsimony makes security systems simplified in which takes away complexity and minimizes vulnerabilities. Lastly, objectivity creates the idea of unbiased decision making that relies on facts rather than assumptions. When put together, the idea of these principles creates an approach that is data driven in order to enhance cybersecurity systems.
Journal #3
By using the Privacy Rights Clearinghouse Data breach, researchers were able to look into patterns in data breaches across the United States and various other sectors. The database mentioned, which is used to bring together publicly reported data breach notifications from US governmnet Agencies, gives people the ability to examine different breach types, industries affected, and the records that become compromised throughout the breach. By looking through the information, the reasearchers are able to find different trends from attackers, and find different effective breach methods. The databases serve as valueable sources of inmformation for creating an understanding of the landscape that is changing and evolving.
Journal #4
Through each portion of Maslow’s Hierarchy of Needs, they relate to real life. For physiological needs, it can help with simply calming someone down with calm music, or tracking health which can keep someone aware of how they are and if they need to work on anything. For safety needs, Cybersecurtiy can provide safechecks with two factor authentication devices, or simply having firewalls that can protect someone’s data. For belongingness and love needs, social media can connect that. With facebook and instagram, messaging apps, and online communities, people can either meet others or keep tabs on close ones. With esteem needs, places like achievements through gaming, professional platforms that keep your accomplishments published, and other examples like that provide what is needed. Lastly, Self-actualization needs are covered through different courses online like udemy and other schooling courses.
Journal #5
There are many different motives that a hacker may have when attacking an organization, but specifically there are a few that are the biggest motivators. Money being first, it has a grip being the most beneficial for hackers as it can provide profitable when commititng cybercrimes. Revenge being second to money, it is another big one as someone may have had issues in the past and will attack in retaliation to an action. Recognition and politics are third and fourth, as recognition is a big one for hacking groups who want their name out in the public and politics are used as a basis in order to represent their ideals. Entertainment comes in fifth as many hackers will test their skills by having fun hacking weaker targets. Lastly is boredom, which isn’t as common as the others. Not too many hackers will hack an organization just because due to the possible retaliations or consequences of their actions.
Journal #6
a
Journal #7
A
Journal #8
A
Journal #9
How did you score?
I scored a 3
What do you think about the items in the scale?
Each item calls on a portion of life where social media causes unrest throughout it. With the more items on the scale, the more that it is indicating you are likely addicted and have some sort of issue involving usage of social media.
Why do you think that different patterns are found across the world?
I believe that in countries where technology is much more accessible, there will be many more issues with it. If you look at some statistics available, in countries like the United States, there are so many more issues, from simply too much use to people getting hurt because of a device distracting them over countries where there are many less devices and more real-world problems.
Journal #10
The article provided focuses on how cybersecurity is an important aspect of warfare in modern times. The article explains that cyber security is a growing field that is attempting to understand and predict how human behavior and society as a whole is affected by cyber threats. Points are made that misinformation is able to be quickly spread by both government and independent groups due to new technological breakthroughs. There are arguments that information warfare, rather than physical warfare, has become an extreme threat that can damage societies as a whole.
Journal #11
In the presentation provided, the presenter focused on the cybersecurity analyst job and pinpoints several social themes. These themes include workforce dynamics, networking, and accessibility. A specific focus of the presentation was the theme on opportunity and inclusion. Cybersecurity is a very required and high-demand field with regularly lower competition. With this, it creates the accessibility of it for individuals without major degrees, requiring them to have simply experience over an expensive college tuition. Work-life balance is another focus, because usually introductory jobs include difficult and late hours that might affect a person’s work life negatively. Lastly, networking is a very important focus mentioned, because a person needs connections in order to break into their career and advance their careers.
Journal #12
Throughout the letter, there are two of each, economic and social science theories, that I focused on. First of the economic theories, is cost-benefit analysis. This focuses on bringing together costs and benefits and comparing them. In the specific breach, what most likely happened is the organization that was attacked compared the expense of building their security versus the potential loss of data. They ended up finding vulnerabilities through a third party that evaluated their security. For the second economic theory, the letter focused on externalities. These are the side effects of economic activity affecting other parties. In this scenario, the data breach affected customers due to different security flaws which caused a data breach. This shows the risks for different stakeholders and customers.
For the two social sciences, the first one is neutralization theory. This specific theory focuses on how people rationalize unethical actions. Since the company did not tell customers about the databreach when it happened and instead waited, it was a form of neutralization which was at the expense of the customers and their trust. another theory is Communication Privacy Management, which focuses on how people control their private information. Since the company did eventually disclose the breach to their customers eventually, they ended up engaging in boundary coordination to manage the private information, which is a key aspect of this theory.
Journal #13
Many companies use the idea of a bug bounty program to their benefit. Bug bounty programs are programs that companies use by allowing external security researchers to make an attempt at finding different vulnerabilities in their organizations and report them. During the study, they found that although higher bounties can attract more people attempting at submissions, the vulnerabilities found do not always compare to the amount of money that was offered. This can prove that there are separate factors that make a difference when it comes to monetary incentives. Things such as complexity of the systems and reputation can make a large difference. Another focus from teh study is the importance of communication between organizations and the researchers.
Journal #14
Of a large list of crimes that can be committed on the internet, Andriy Slynchuk specifically focuses on pirating software or media. Due to people not supporting things like the media that is there, it causes the creators of teh content to face loss. Another serious offense that is focused is stealing another person’s wifi without their explicit permission. Again, this would be a form of theft due to a person stealing private services. Another big crime is accessing someone’s social media or email without permission, which is a really bad crime. Lastly, harassment and cyberbullying is a psychological attack on people and can affect someone mentally. All of these different offenses are important because they not only break the law, but also can cause harm to other people nad organizations.
Journal #15
The speaker in the video expained the journey he took to get into digital forensics, and I see how this connects with social sciences. Forensics is about understanding different behaviors, motivations, and interactions, not just technology. Inside the lecture, he showed that key parts to the job include data colection and legal processes. These provide evidence that it is important to understand psychology, law, and ethics. The career transition he took focuses on how focusing on detalis, basic critical thinking, and the ability to communicate are just as vital in digital forensics as they are in the social sciences.