Journal Entry

The areas I would want to focus my career on in the NICE Workforce Framework is are Operate and Maintain and Protect and Defend the least for me would probably be investigate.

Ways the principle of science relate to cybersecurity. The principles of science is similar to cybersecurity risk assessment process where professional identifies the various information assets that could be affected by a cyber attack.

How might researchers use this information to study breaches?  The data breach could be the initial part of a multi-step attack. For example, hackers might use the personal information to steal the victim’s identity, create a new identity, or to trick the victim as part of a social engineering attack. Attackers may also be able to deliver ransomware that encrypts an organization’s data, making it unusable unless the victim pays a ransom. 

Review Maslow’s Hierrachy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

#1 Physiological Needs

For instance, when I was in STEM and I needed to fix a computer for students, I would focus on the most important thing at that time and worry about the rest later.

#2 Safety Needs

For example, when I was head of the STEM program at my school. I wanted a safe enviroment, so I could just focus on work.

#3  Love and Belonging Needs

In my environment, people showed respect to one another and we built a family bond. It makes accomplishing goals and task easier.

#4 Esteem Needs

This is a connection to number three as well, respect and connection will make everybody confidence better.

#5  Self-Actualization Needs

While I was in the program I had to self improve. This means gain skills and take everything serious, by pushing my best foot forward.

Ranking the 7 motives

  1. Money: money is first because that is what runs the world rather we like it or not.
  2. Recognition: this will be second for me because everybody seeks attention in today’s age especially with social media being at its peak.
  3. Political: politics plays a major part in life an example of this is, you could have more credentials than somebody and they could still get the job over you through a connection that they have.
  4. Entertainment: this flows with money and recognition, those two things is the reason entertainment is the biggest field today.
  5. Revenge: sometimes somebody just wants to prove themselves and show that there better than. A known word for this is greed.
  6. Multiple reasons: it could be all the previous said things together.
  7. Boredom: some people do things because they are bored and not happy with their lives.

Can we create three fake websites and three real websites and ask
them to spot what makes them fake?

Ways to spot a fake website from real.

  1. Examine the URL Examining the URL is one of the easiest ways to determine whether a website is genuine. A URL that is simple to remember and read indicates that the website is legitimate. On the other hand, a fake website frequently has a lengthy and intricate URL. Additionally, in order to deceive visitors into thinking they are on the genuine website, fraudulent ones frequently employ URLs that are similar to those of legitimate ones.
  2. Check for errors in grammar and spelling Another way to identify a fake website is to check for errors in grammar and spelling. Professionals will have proofread and edited a legitimate website. On the other hand, a fake website is likely to have many errors.
  3. Examine the content When reading a website’s content, consider whether it appears to be genuine. Content on a website attempting to defraud you frequently lacks clarity or is poorly written. Additionally, content on a fake website frequently lacks relevance to the subject at hand.
  4. Check the contact information A legitimate website will have contact information like an email address or a phone number that can be found easily. Most of the time, a fake website doesn’t have this information or has contact information that doesn’t work.
  5. Be wary of pop-ups and advertisements A website with a lot of pop-ups and advertisements is usually a fake. The sole purpose of these websites is to advertise and make money.
  6. Make use of your intuition. If a website has something that doesn’t seem right, it probably is a fake. Don’t give any personal information or money to a website that you aren’t 100% sure is legitimate; instead, trust your gut.

Create a meme explaining what is going on in the individual’s or individuals’ mind(s).

https://imgflip.com/i/6x57mk

This meme relates to HMI because it shows that HMI has done its job. It has focused on human during product development, as to what they want and like. This was accomplished by recognizing interactions between humans and technological processes.

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

On the Social Media Disorder scale I scored a 2. I think the questions in the scale are legitimate question to find out if you have a social media disorder. I believe that they find different patterns across the world, because everybody is different: and in other countries their technology is limited on what they can use.

Read this and write a journal entry summarizing your response to the
article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/

Technology today is enabling both state and nonstate actors to manipulate the global marketplace of beliefs and ideas at the speed of algorithms, and this is changing the battlefield at all levels of war. These are applied at multiple levels, from the individual through the conversation level to the larger community level.” If left unchecked, this emerging ‘information blitzkrieg’ will have strategic effects on par with the physical blitzkrieg unleashed at the outset of World War II.” In order for the Department of Defense “to defend the security of our country and sustain American influence abroad,” our military leaders must understand this emerging discipline of social cybersecurity and how it impacts our force, nation, and values. 7 While the West viewed the article backward through the lens of the Ukrainian conflict and has arguably misattributed it as the start of hybrid warfare for Russian armies, his article was in reality his perspective of the Arab Spring as well as U.S. operations in Yugoslavia, Iraq, and Afghanistan. Oleg Kalugin as “active measures to weaken the West, to drive wedges in the Western community alliances of all sorts, particularly NATO, to sow discord among allies, to weaken the United States in the eyes of the people in Europe, Asia, Africa, Latin America, and thus to prepare ground in case the war really occurs”. In 1951, then Yale Law professor Harold Lasswell summarized the Soviet propaganda machine (to which the current Russian security apparatus is heir) by concluding, The chief strategic aim of [Soviet Propaganda] is to economize the material cost of protecting and extending the power of the Russian elite at home and abroad. Such propaganda is a struggle for the mind of man, from the Soviet point of view, only in the sense that it is a struggle for the control of the material means by which the minds of the masses are believed to be molded. Hence the purpose of Russian propaganda is not peaceful persuasion of the majority of the people in a given country as a prelude to taking power. And he is not afraid to work in the regions of Russia. These organizations controlled the flow of information and generally distributed it uniformly across a society. With the rise of blogs, microblogs, and social networks, most of the world now obtain their information in a nonuniform way on social media.


Read this https://dojmt.gov/wp-
content/uploads/Glasswasherparts.com_.pdf sample breach letter
“SAMPLE DATA BREACH NOTIFICATION” and describe how two
different economics theories and two different social sciences
theories relate to the letter.

The two economic theories that relate to this letter are rational choice and Marxian economic theory. Rational choice because individuals and businesses decide whether to invest in malware and did not here. Marxian economic theory because a poor individual was taken advantage of because lack of knowledge on cyber security threats. The two social science theories critical theory and symbolic interaction theory.

The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

Major bug bounty platforms, including HackerOne and Bugcrowd, have already facilitated the payment of hundreds of millions of dollars; in May 2020, HackerOne reached the threshold of $100 million in bug bounty payments. As a result, researchers have yet to definitively establish the effects that a company’s revenue, industry, and brand profile have on the number of reports that their programs receive. We explore the organizations that benefit the most from bug bounties by evaluating the factors that determine the number of valid reports that each program receives in a month . Second, it finds that a company’s size and profile do not have an economically significant impact on the number of reports it receives, reinforcing the value of bug bounties for smaller, less prestigious companies. In our background section, we discuss the theoretical benefits of bug bounties; the factors that have been posited to impact ethical hacker supply (many of which we will include in our regression); and past empirical studies of bug bounty markets. This suggests that firms should employ a host of methods and diverse groups of people to find the greatest number of bugs. The code base is only updated once a vulnerability is resolved and, in the event of a collision, only the first hacker to discover a bug is compensated. It is likely that quicker resolution times will become more important as the community of security researchers participating in bug bounties grows and the chances of a collision increase. Revenue The literature is equivocal on the impact of company revenue on the number of bugs that are found in a given month. Her rationale is that bugs are emblematic of larger flaws in process; only large companies have the resources to diagnose these flaws 

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

The five most serious to me are sharing passwords, addresses, or photos of others , bullying and trolling, using other people’s internet networks, illegal searches on the internet, and faking Your identity online.

Complete the Patchin and Hinduja’s cyber bullying survey. After
completing the survey, discuss how you think criminologists might use
the surveys to explore relationships between the different items.

A victim survey, the National Crime Victimization Survey (NCVS) asks households all over the United States about crimes of which they have either witnessed or been a victim. The NCVS, in contrast to the UCR, gathers information about crimes that have not been reported to the police. The review gathers point by point ”casualty, guilty party, and situational setting of violations, for example, the time, place, weapons utilized, and moves initiated during the wrongdoings. This definite data gives an all the more clear, sensible, and itemized perspective on delegate crime percentages and conditions.

Unofficial criminological surveys of individuals who may or may not have committed crimes are known as self-report surveys (SRS). By and large, these reviews are regulated to adolescents who can be gotten to through schools or restorative establishments. The most well-known SRS specifically measures a wide range of criminal acts and intentions, including assault and drug use, through the National Youth Survey. The extent to which youth in the United States are involved in criminal activity has become clearer as a result of this.

Leave a Reply

Your email address will not be published. Required fields are marked *