CYSE201S

Journal 1

The NICE workforce framework is like a foundation or a base for the capability of the U.S workforce to increase in size. In the NICE workforce framework, they are 52 work roles They are seven different areas in NICE Workforce Framework. Securely Provision, Operate and Maintain, Govern, Protect and Defend, Analyze, Operate and Collect, and investigate are the seven different categories of the NICE Workforce Framework. In the analyze category, a person would evaluate information to determine its usefulness. In the collect and operate category, a person would provide specialized denial and collect information about cybersecurity that would be used to develop intelligence. In the investigate category, you would investigate cybersecurity crimes or networks. In the operate and maintain category, people would provide support to ensure that the IT system performance is efficient. The category of protecting and defending helps identify threats. In the oversee and govern category, a person would provide leadership and advocacy so that the company or organization conducts work in cybersecurity. Insecurely provision, it has responsibility for aspects of network development.  In the NICE Workforce Framework, I would want to focus on analyzing data or analyzing different networks for my first job in cybersecurity because I used Wireshark a couple of times to watch the traffic in the different networks to see if they were any suspicious activity.  I think my idea two jobs for me is to be a cybersecurity analyst or have a job doing digital forensics. But, in digital forensics, I am going to have to do long reports on the electronics or give a deep description of how the body is. The only ones that really caught my eye were protected and defended, securely provision, analyze, and investigate. Govern, operate and maintain, and operate and collect were the least appealing to me. 

Journal 2

Cybersecurity is an applied science. If I was to compare cybersecurity to science, I would say that the CIA triad has similarities to the principles of science. The CIA triad consists of three main components such as confidentiality, integrity, and availability. Confidentiality refers to keeping a company’s important private information a secret. The cybersecurity principles govern, protect, detect, and respond. Govern identifies security risks. Detect understands cyber security events. Protect implements security controls to reduce security risks. Respond is when a person is responding to cyber security incidents. A person is authorized to ensure that only those who are authorized have access to specific assets and that those who are unauthorized are actively prevented from retrieving access. Integrity refers to the quality of anything being complete. It is also about making sure that the information has not been messed with. Availability refers to the networks and applications that are up and running. The principles of science have basic principles that help guide people that study science that express the honor integrity of knowledge, honesty, collegiality, objectivity, and openness. According to the module, “In The Social Order, Robert Bierstedt (1970) argued that the social sciences adhere to the same principles as the natural sciences.  The conclusion that can be made from this is that the social sciences are just as scientific as the natural sciences.”. Cybersecurity can relate to the principles of science by providing any dynamic defense and the science part of cybersecurity can rely on any analytics that can be predicted based on the data gathered by active observations. 

Journal 3

According to Abraham, “Abraham  Maslow’s hierarchy of needs suggests that all humans have needs that exist on a hierarchy.  The theory suggests that as our lower-level needs are met, we begin to focus on meeting our upper-level needs.  Central to this belief is that our behavior is determined by our needs and our needs can change over time.  This figure identifies the five levels.  According to Maslow, all individuals strive for self-actualization, though few of us, in his view, ever meet that need.” Safety needs can be related to technology by having my passwords safe in a lock note in my phone. I can have a VPN on my phone too. In the belongings stage, I can have my phone and Ipad on me everywhere I go. In the esteem needs stage, I can do homework and do zoom calls. In the last stage, self-actualization is related to technology because you can do activities on your phone or laptop and you can be creative. You can be creative such as painting pictures or creating diagrams. According to the module, cyber behavior is a type of human behavior, is reasonable to consider the connections between cyber behavior and Maslow’s hierarchy of needs. To most people, technology has become a physiological need. If the digital needs are met then the next level would be security needs. Social media is used by a lot of people and the more that people use social media, the more they felt belonged. Social media can influence the public either in a good way or a bad way.

Journal 4

Module 5 talks about describing individual motives for cyber offending, describing the psychological theories that explain cyber offending, applying psychological principles to cyber victims, and cybersecurity professionals. The 7 motives that make sense in order would be recognition, entertainment, politics, for money, multiple reasons, revenge, and boredom. I chose recognition first because everyone needs to be recognized for doing the good thing and their work. In order to encourage everyone else, they would like to be recognized. The second motive I chose is entertainment because everyone would like to be happy and feel relaxed by watching videos on social media. Everyone likes to listen to music to relax their minds and be stress-free. The third motive I chose was political because people need a leader in the political aspect to make great decisions. If a person is being politically minded, they would need to know the law of our country. The fourth motive I chose is for money because before we buy anything, we need to have money to use it. Before spending money, everyone will need to think carefully about what they are going to buy such as not using money to do anything illegal. The fifth motive I chose was multiple reasons because it will make many people fight. A person wouldn’t know what’s going on if the other people wouldn’t listen to their reasoning. The six motive I chose was revenge because everyone would want revenge if a person has ever did a bad thing to them before. Before taking revenge, people need to think if it’s good for them. The last motive I chose is boredom. If a person gets bored nothing will happen to that persons’ life.

Journal 5

According to module 4, human system integration is a phrase sometimes used instead of “human factors”.  The phrase is seen as advantageous because it draws attention to the importance of focusing on human behavior in understanding the impact and consequences of technological systems. Human system integration is also interdisciplinary. It is focused on safety, aims for the best performance of the technology, more attention than human factors, encourages a focus on humans during product development, and recognizes interactions between human and technological processes. This meme refers to human system integration because students in classes try so hard to get good grades or aim for a 4.0-grade average. It takes dedication and a lot of practice to earn a successful internship or job. If a person is already has a job, the person attends to work a lot and does not have time to socialize. Having a successful life isn’t always fun. That means you need to be the first person there and the last person to leave. They are a few people that have a successful lifestyle and have a great social life. They are always busy with work. That would lead to emotional problems at work because they won’t know how to interact with employees. There is always the other few that do have successful lifestyles and social life. It’s really a problem if you hate your job and that’s the job that you are doing. But in this meme, he is enjoying time at work and he is well organized. 

Article Reviews 1/2

    Article #1

The article “Cyber-attack at Vodafone Portugal knocks mobile network services offline”, is related to social science because the article talks about a cyber-attack breaking the criminology and the economics discipline. According to module 1, the criminology discipline is the study of crime, criminals, and society’s response to them. On February 7, an attacker targeted Vodafone Portugal and knocked mobile networks offline across the country. It suspended 4G and 5G networks for customers. It also suspended digital TV and SMS services. Another social science discipline that is related to this article is economics because the company used its limited resources to try to figure out what happened and why it occurred. One of the research methods they used was field research. Hayward stated that “ Vodafone said its cybersecurity team is working with authorities as it investigates the incident.” Also, they posted a video on Twitter stating that CEO Mario Vaz said that the company has been working non-stop to quickly restore services. According to Haworth, “As soon as the first sign of a problem on the network was detected, Vodafone acted immediately to identify and contain the [impact] and restore services.” I believe that Vodafone said that they have not seen any evidence of customer data being accessed due to the attack.

      Work Cited

Haworth, Jessica. “Cyber-Attack at Vodafone Portugal Knocks Mobile Network Services Offline.” The Daily Swig | Cybersecurity News and Views, The Daily Swig, 9 Feb. 2022, https://portswigger.net/daily-swig/cyber-attack-at-vodafone-portugal-knocks-mobile-network-services-offline

Article #2

The article “Cyber-attack forces shutdown of one of the US’s largest pipelines”, is related to social science because the article talks about a cyber-attack shutting down a 5,500-mile pipeline breaking the economics and criminology disciplines. According to module 1, criminology discipline is the study of crime, criminals, and society’s response to them. In May 2021, hackers hacked the pipeline so criminals can make money. The prices of gas went up and a lot of gas stations were out of order because they didn’t have any more gas. The criminals wanted money not only for themselves but also wanted to give some of the money to different charities. According to Salam, “The pipeline transports gasoline, diesel and jet fuel. The company’s website says it carries some 100m gallons of fuel each day and services seven airports. The attack, which took place on Friday, included ransomware according to the Washington Post.” Another social science discipline that is related to the article is economics because the government had limited resources in order to give the hackers what they want. One great example of the economic discipline is when Vodafone said “The service is also subject to some limitations, namely with regard to the maximum speed allowed in order to ensure better monitoring of network usage, as well as a more equitable and sustainable distribution of the capacity made available to our customers”. One of the research methods the government used was field research. Salam stated that the company said “Colonial Pipeline is taking steps to understand and resolve this issue. At this time, our primary focus is the safe and efficient restoration of our service and our efforts to return to normal operation. This process is already underway, and we are working diligently to address this matter and to minimize disruption to our customers and those who rely on Colonial Pipeline.” 

Work Cited 

Salam, Erum. “Cyber-Attack Forces Shutdown of One of the US’s Largest Pipelines.” The Guardian, Guardian News and Media, 8 May 2021, https://www.theguardian.com/technology/2021/may/08/colonial-pipeline-cyber-attack-shutdown

Article Reviews 3/4

Article #3

The article “FBI Most Wanted Russian National Accused of Running Dark Web Marketplace” is related to social science because the article talks about a US law enforcement running a dark web to trade stolen data and credentials. According to module 1, criminology discipline is the study of crime, criminals, and society’s response to them.On March 22, the department of Justice said that the indictment of Igor “Floraby” Dekhtyarchuk, who has been charged with trade of thousands of stolen accounts, personally identifiable information, and hacking tools by a federal grand jury. According to Jim Smith, FBI Houston Special Agent in Charge,  the cybercriminal marketplace promoted the sale of compromised credentials and other financial information. Also he said that behind these black web marketplaces, the cybercriminal actors go to great length to obfuscate their true identities and use to utilize other methods to further anonymize their activities. The research method that was used was field research because after the criminal got caught the FBI looked at everything on the black website. They looked at every person that leaked their identity or give away private information out. Another social science discipline that was broken was economics because the government had limited resources in order to give the hackers what they want. The FBI only had limited resources to capture the cyber criminal. The FBI has still not caught him. According to the article, Dekhtyarckuk is now on the FBI’s Most Wanted List and a federal warrant has been issued for his arrest. His last known location was Kamensk-Uralsky, Sverdlovsk Oblast, Russia. 

Osborne, Charlie. “FBI Most Wanted Russian National Accused of Running Dark Web Marketplace.” The Daily Swig | Cybersecurity News and Views. The Daily Swig, 24 Mar. 2022. Web. 17 Apr. 2022.

Article #4

The article “Ukrainian ISP used by military disrupted by ‘powerful’ cyber-attack”, is related to social science because the article talks about a Ukrainan internet service provider that supplies the country’s military was hit by a cyber attack.  According to module 1, the criminology discipline is the study of crime, criminals, and society’s response to them. On March 28, the attack knocked the networks offline and it was confirmed by the State Service of Special Communications and Information Protection that the attack was so powerful it distirbed the networks. Some of the customers were restricted from accessing communication networks for military and other high prriority users. According to the article, “The SSCIP wrote on Twitter: “In order to preserve its network infrastructure and to continue providing services to Ukraine’s Armed Forces and other military formations as well as to the customers, #Ukrtelecom has temporarily limited providing its services to the majority of private users and business clients.” The research method that was used was archival research because it’s a case record that was missing information. According to the article, “We are doing our best to stop the aggressor.

The Daily Swig has contacted SSSCIP to determine where the attack originated and will update this article accordingly.” Another social science discipline that was broken was economics because the company used its limited resources to try to figure out what happened and why it occurred.

Haworth, Jessica. “Ukrainian ISP Used by Military Disrupted by ‘powerful’ Cyber-attack.” The Daily Swig | Cybersecurity News and Views. The Daily Swig, 29 Mar. 2022. Web. 17 Apr. 2022.

Career Professional Paper