Journal entry’s , Article Review’s, Career Paper, Discussion Board Posts

Journal 1

After reviewing the Nice Workforce Framework. I would like to focus my career on protecting and defending against data breaches. I also find analyzing and investigating information interesting and wouldn’t mind getting to learn more bout it. The area I was least interested in is the oversee and govern area.

Journal 2

After reviewing the Nice Workforce Framework. I would like to focus my career on protecting and defending against data breaches. I also find analyzing and investigating information interesting and wouldn’t mind getting to learn more bout it. The area I was least interested in is the oversee and govern area.

Journal 3

Researchers could use the information found on this website in many ways. A researcher could use this information to discover which bank is safe to deposit funds in. This information could also be used for research on which bank has the lowest breach point with great security measures to protect their users. The information on this website could also be used for researchers to better understand what data breach chronology is. This website also could be used to identify the different types of data breaches that occurs with organizations in the world today.

Journal 4

The Physiological needs part of Maslow’s hierarchy of needs relates to technology in many ways. For example you could use technology to purchase water, food, shelter, and clothing. The safety needs portion of Maslow’s hierarchy of needs relates to technology because you can use technology to store passwords for all the apps you use, and you could use technology to help apply for jobs. For the love and belonging portion of Maslow’s hierarchy of needs. You could use technology to contact your love ones and friends whenever you would like with a cellular device. For the esteem portion of Maslow’s hierarchy of needs. Technology could be used with setting reminders and leaving notes on your cellular device to help keep you positive to always have great self eteem and help you build self love. For the Self-actualization portion of Maslow’s hierarchy of needs. Technology could be used to set alarms to make sure you re never late to any appointments or jobs, you could also also set up personal Ai online assistant to help schedule meetings etc. In conclusion Maslow’s hierarchy of needs could be used through technology efficiently.

Journal 5

Yes I can tell fake websites apart from real ones. For example https://www.odu.edu is a real website and https://www.odu.com isn’t a real website because it is educational website so it will use .edu other than .com. Secure websites always use HTTPS instead of HTTP so if you see a URL with “https://” instead of “http://”. It most likely an unsecure website. We should also pay close attention to pop ups because most scammers use these links to trick people to download malware to your device and steal your information.

Journal 6

All of these memes relates to human system integrations because they all show humans or objects using technology as we know it today.

Journal 7

The media usually focuses on cyberattacks and breaches rather than on preventive measures and education. It’s crucial to understand that cybersecurity is not solely reactive but it is proactive as well. By not highlighting the importance of preventative measures, the media fails to empower individuals and organizations to protect themselves effectively.

Journal 8

  1. Yes 
  2. No 
  3. No
  4. Yes
  5. no
  6. Yes
  7. No
  8. Yes
  9. Yes
  10. i think there are different patterns for this all over the world do to different cultures and how they bond in there environment


Journal 9

The job of a cybersecurity analyst is inherently intertwined with social behaviors in various ways. Firstly, the analyst plays a crucial role in safeguarding the digital ecosystem, which is increasingly integrated into our social lives. Their work ensures the protection of personal information, privacy, and trust in online interactions. Moreover, the job entails constant monitoring of network activities, which can lead to an ethical dilemma when balancing security needs with individual privacy. This highlights the broader societal conversation on the trade-off between security and personal freedom. Furthermore, cybersecurity analysts often collaborate with multidisciplinary teams and communicate complex technical findings to non-technical stakeholders. This interaction underscores the importance of effective communication and social skills in the field, as analysts need to work closely with others to mitigate threats and vulnerabilities. Overall, the role of a cybersecurity analyst serves as a microcosm of the broader social challenges related to cybersecurity, privacy, and the delicate balance between security and personal freedom.

Journal 10

In summary, this exploration of the social aspects of cybersecurity in the article has provided a fresh perspective on the intricate web of factors that shape our digital world’s safety and security. It has ignited my curiosity and passion for further research and understanding in this crucial field. The article has left me with a profound sense of the interconnectedness between technology and society. It emphasizes that cybersecurity is not solely a technical issue but a multidisciplinary field that requires collaboration among experts in technology, psychology, law, and ethics. Furthermore, it highlights the urgent need for holistic solutions that consider the social and human dimensions of cybersecurity.

Journal 11

In summary, this exploration of the social aspects of cybersecurity in the article has provided a fresh perspective on the intricate web of factors that shape our digital world’s safety and security. It has ignited my curiosity and passion for further research and understanding in this crucial field. The article has left me with a profound sense of the interconnectedness between technology and society. It emphasizes that cybersecurity is not solely a technical issue but a multidisciplinary field that requires collaboration among experts in technology, psychology, law, and ethics. Furthermore, it highlights the urgent need for holistic solutions that consider the social and human dimensions of cybersecurity.

Article Review 1

Article #1- Understanding the Use of Artificial Intelligence & Cybercrime 

Review: This article relates to social sciences through making points on how artificial technology in cybercrime impacts society. It explains how criminals in society can take advantage of AI. It can be used for interpersonal attacks such as creating fake videos and images of people and increasing the risk of cyber attacks. One of the studies in this journal can include the research of interpersonal-deepfake and preventive methods. The researchers used theories and experimented on people as a part of their research. The use of routine activities and Eysenck’s theory of criminality as frameworks revealed the characteristics of criminals. They came to the conclusion that young people in their 20’s were likely to commit crimes in the metaverse and the future could hold more financial crimes. A possible solution the journal suggested was more proper guardianship to prevent crime in the metaverse. This relates to society though explaining the possible cybercrimes and disadvantages of the AI in society in the future generations and even now. 

Source: LOZONSCHI, C., & BAKHAYA, I. (2023). Artificial Intelligence and its impact on Cybercrime. Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3). https://doi.org/10.19107/cybercon.2023.16 

Article #2- Social media is a huge part of society and people’s everyday lives. Although social media is a way of connecting with people and staying in the loop with friends, robots are also a part of the media. This journal explains how bots can be harmful or be irrelevant depending on a machine. Oentaryo performed a study on the difference between malicious bots and benign bots which were found to be 484 benign bots and 105 malicious bots. They used looking at significant features such as tweets, retweets, hashtags, mentions, and URLs as a way to determine maliciousness from benign. In conclusion, the researchers used  GMM, S3VM, LP, and LS to identify the bots and their patterns. The purpose of this study was to minimize cyberattacks and threats through social media. This relates to social sciences and as well as society though protecting and creating awareness about bots that can be a threat to social media users around the world.  

Source: Innocent Mbona, Jan H P Eloff, Classifying social media bots as malicious or benign using semi-supervised machine learning, Journal of Cybersecurity, Volume 9, Issue 1, 2023, tyac015, https://doi.org/10.1093/cybsec/tyac015

Article Review 2

Cyberstalking Article Review

Cyberstalking, akin to physical stalking but in the digital realm, involves one individual persistently intruding on another, causing fear and distress. This form of harassment encompasses unwelcome monitoring, incessant communication, unauthorized visits to victims’ homes or workplaces, and various forms of intimidating behavior (Marcum, et al., 2014). The internet’s inherent features, such as anonymity, accessibility, and efficiency, make it a fertile ground for cyberstalking, raising concerns about its prevalence and impact (Marcum, et al., 2014). Cyberstalking is facilitated by the unique characteristics of the online world. Anonymity, identity flexibility, and the lack of deterrence factors in cyberspace empower offenders to commit cybercrimes with relative ease. Research has shown that criminal behavior initiated online can often spill over into the physical world, and vice versa (Jaishankar, 2014). Cyberspace’s dynamic, ever-evolving nature offers offenders opportunities to evade detection. Strangers may join forces online to commit physical crimes, while individuals from physical communities may collaborate to engage in cybercrimes. This fluidity demonstrates the extent to which cyberstalking can pose a societal problem if not effectively addressed.Impact on Victims: Cyberstalking takes a significant toll on its victims, primarily on an emotional and psychological level. One of the most profound consequences is the constant feeling of privacy invasion. Victims often feel as though they are under perpetual surveillance, leading them to withdraw from both online and offline activities, severely affecting their overall quality of life. Cyberstalkers employ various tactics to create fear and exert control over their victims. They send threatening messages, post hurtful comments on social media profiles, or even resort to creating fake accounts to impersonate the victim. These forms of continuous harassment and intimidation leave victims feeling helpless, isolated, and reluctant to seek help. The cumulative effects of cyberstalking can lead to long-term trauma for victims, and in extreme cases, even suicidal thoughts. Victims may experience overwhelming guilt and isolation from friends, family, and society at large, making it crucial to address and combat cyberstalking as a societal concern. Cyberstalking is closely related to cyberbullying and cyber victimization. The process of victimization on the internet, primarily through the use of personal information, can make victims feel singled out and targeted. Unfortunately, many victims of cyberbullying refrain from sharing their experiences with family and friends to protect them from becoming targets as well, resulting in victims carrying the burden of stress and anxiety alone. In conclusion, cyberstalking is a grave concern, impacting individuals emotionally and psychologically, and potentially driving them to severe social isolation and mental health issues. This issue, intrinsically linked with the dynamics of the online world, should be addressed comprehensively to protect individuals and society as a whole.

    Citations

Catherine D. Marcum, George E. Higgins & Melissa L. Ricketts (2014) “Juveniles and Cyber Stalking in the United States: An Analysis of Theoretical Predictors of Patterns of Online Perpetration” International Journal of Cyber Criminology Vol 8 Issue 1 ISSN:0974 – 2891 Open access Version of record available @http://www.cybercrimejournal.com/previousissueijcc.html

https://www.researchgate.net/profile/Jaishankar-Karuppannan/publication/268032777_Establishing_a_Theory_of_Cyber_Crimes/links/5948c72e0f7e9b1d9b234379/Establishing-a-Theory-of-Cyber-Crimes.pdf

The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence

Career Paper

Humphrey Quaye  

Dr. Yalpi

CYSE 201s

28 Nov 23

The career I choose for this paper is an Information security analyst. I chose this career because it was the most interesting career that stood out to me in the cyber realm and I believe that I would be a great fit for it. Information security is the process of protecting information by mitigating information risks and using analytical skills to help protect any company’s electronic data. To become an informational security analyst you will need a bachelor’s degree in science of cyber security, gain some on site experience, earn some certifications such as an Certified Information Systems Security Professional (CISSP) or an Certified Ethical Hacker (CEH), and have a wide set of collaborative tools.  Most information security professionals work in an office inside of an It department of an organization in groups to help identify risks and help eliminate them from any cyber attack or threat.

Information security analysts are expected to analyze their companies’ most recent security measures and programs and determine whether they are protected or not so that they could come up with new innovative ideas to help improve their systems.  Information security analysts are recommended to work together with business administrators and IT techs to come up with new and adaptive ways to help secure an organization’s security. Information changes rapidly on a daily basis so within this job you will have to be very dedicated and stay up to date with information and share your knowledge with coworkers to maintain a position in this field. 

Information security analyst has to also focus on understanding cyber mediated changes in human behavior. To be able to help build a strong social cyber infrastructure to persist in  a cyber mediated information environment. For example a covert group puts out fake news and false information on instagram or twitter or even creates a fake email saying you’ve received a check for an insane amount of money. The site’s information security analyst will work deliberately together to collect information to show why the covert group’s information is wrong and show you facts to eliminate their misleading mis\information. Most companies will even send out an email warning you not to open it because it is a scam or a minor breach in the company’s network.

Overall cyber security information security analyst is a growing field in today’s society and plays a major role keeping every company’s internet data safe and sustainable from data breaches and cyber attacks in today’s cyber world. To become an informational security analyst you will  need a bachelor’s degree in science of cyber security, gain some on site experience, and earn some certifications such as an Certified Information Systems Security Professional (CISSP). You would also need a great amount of collaborative tools to work with others to gain great ideas to prevent future cyberthreats and events with great amounts of misinformation.

References

https://heinonline.org/HOL/Page?collection=journals&handle=hein.journals/ijisc3&id=31&men_tab=srchresults

https://online.maryville.edu/online-bachelors-degrees/management-information-systems/careers/how-to-become-an-information-security-analyst/

https://nap.nationalacademies.org/read/25335/chapter/10#179


Discussion Board Posts

The NIST Cybersecurity framework helps organizations identify and prioritize cybersecurity risks.  Which helps them take measures to protect their critical infrastructure assets. Risk Management provides a structured approach to help organizations access and manage cybersecurity risks-efficiently which reduces the threat of cyberattacks. Improved Communications within the framework offers a common language with structure for communications in the cyberspace within organization’s. This makes communication and collaboration better within organizations and helps them to protect their infrastructure’s. This helps companies reduce the risk of an cyberattack from occurring. In my future workplace this information would be useful because I would go through these events on a daily basis and already have the information I need to make my job easier.

As the CISO for a publicly traded company. I will ensure the company’s system is always available and analyze new vulnerabilities and threats and do constant checks and updates to ensure functionality of the systems. I will also prioritize updates according to new threats in the system without disrupting the network operations. According to the rate of breaches and threats happening to the company daily as my role as CISO I will make sure that all systems are up to date and updated regularly.

The approach I would take with cyber policy infrastructure, based on the knowledge we’ve received from the “Short arm” is to  make our policies flexible to be able to adapt to any new changes in our system because cyber security is a constantly changing field and most policies and frameworks could become outdated quickly. We should also monitor any new threats and vulnerbilitys in our network systems. We should also work diligently with other organizations to share information that could enhance our understanding of cyber threats and vulnerabilities to come up with more effective ways to eliminate them swiftly.

Leave a Reply

Your email address will not be published. Required fields are marked *