CYSE 201S

Week One Journal

The areas I would like to focus my career on is operating and maintaining systems, protecting and defending systems, and oversee and govern as well. These areas appeal to me the most because I think they have the most coding and communication involvement. Coding is one of the most interesting parts of cybersecurity and one of the best parts of being in a group is the group work and getting to meet new people as well as the group projects. Areas of cyber I find appealing include protecting and defending systems. I enjoy these denominations the most because I think they have the most coding and communication involvement. While the fields seem interesting, collecting data all day doesn’t seem like a very fun part of cybersecurity, it doesn’t involve much coding and that’s one of the parts about cyber security that interest me the most

Week 2 Journal

The principles of science relate to cyber security in a lot of ways. One way it relates is by using scientific methods to look into the causes and effects of a cyber attack, for example, social sciences. They investigate the way people think in a social setting. Data analysis also plays a part in cyber security. They could use this by identifying the different kinds of cyber threats, they use to improve security systems. Communication Science is also used in cyber security as well. Cyber Security uses communication in the workplace to better the company as well as the security involved in the company. Instead of being venerable they can have better security and keep their workers safe.

Week 3 Journal

There are many ways researches use information on Privacy rights to study data breaches. Researches use how often data breaches happen, what organizations are targeted, and how they respond when getting hacked as data to study breaches. They can use these to study breaches to identify what a companies weaknesses are and their strengths. They can also identify if they Cyber-Security team is strong and how often they get to the attacks before they happen. Companies can identify if their users are safe using their website as well, going online and entering sensitive information is a huge part of how a company works. Online attacks will only get worse and happen more often, so companies have to learn how to effectively treat these situations.

Week 4 Journal

Marlow’s Hierarchy of needs relates to my experiences with technology in many ways. Physiological needs relate to my experiences with tech by ordering my food and water, for example door dash allows me to order food whenever I want and have somebody drive it to me even if it cost a lot more money. The hierarchy of needs also relates to tech because of safety, tech allows me to monitor who comes in and out of my house with an ring camera and access my bank account at my convivence. Another need is love and belonging needs, tech relates to these needs by allowing me to text whoever I want (unless I’m blocked). I can also use tech to contact my loved ones like my family and friends.

Another need is esteem needs, tech relates to these by allowing me to do research on how to better myself and reach my goals. The internet has millions of facts and different kinds of experiences that people went through to help me as well. Self-actualization needs are needs for personal growth, tech relates to this by allowing people to express themselves in a manner that is wider than it was before. There are many different groups online for people who express themselves and groups for people of different backgrounds. Due to the internet, people can talk with and relate to who they want to. They can also explore new things and gain a better understanding of what they want to do with their life.

Week 5 Journal

  1. For money: Everybody wants money and cybercrimes make it so people can get it from home, money is very important for people to live
  2. Revenge: Cybercrimes are a great way to get back at somebody like steal their identity or take send them phishing emails to find their email password and username. Very important because it causes other crimes to happen again and again
  3. Boredom: Some people just get bored and decide to go for people who’s accounts look weak and are easy to target as well as companies. Sometimes people get bored and need something to do to entertain themselves, somewhat important.
  4. Political: In order to gain priority over their opponent and go in dept for their hidden secrets, not very important.
  5. Entertainment: People need to stay entertained and sometimes they do bad things to find out companies weak points and other peoples. Not so important.
  6. Recognition: Like the online hacker who hacked rockstar games for, recognition is not that important because it only last a few weeks on the media.
  7. Multiple Reasons: not very important

Week 7

Me when I finally understand how the social sciences of Cyber security work

This meme relates to human centered cyber security because of the social sciences. The social sciences are apart of the humans and how they work. Also cyber security and the social sciences is a class.

How I react when the code for my cyber security class doesn’t work

This relates to human centered cyber security because cyber security involves coding. Humans code and when the code doesn’t work and they have to go through the whole thing again it gets annoying, This is their reaction.

How I react when I see my cyber classes are cancelled right before spring break.

For many people cyber classes are fun but it’s also a good thing to have some classes cancelled or a break. This relates to cyber security because of how many people take them. Having a break can better prepare the brain for future.

Week 7 Journal

The media influences our understanding of cyber security in many ways. The influence can be good and bad, some examples are that the media creates myths and stereotypes, fear, and how much cyber security professionals have to focus on the technical aspect. The media shows that hackers are either heroes or villains and don’t have a gray area in between. In reality there are different kinds of hackers like white hackers and green hackers. In most media hackers create fear, this isn’t always the case. Some hackers are good and help other people in the real world.

Week 8

When taking the SMDS I got a 3/9. The items on the scale are pretty good questions and are accurate. I think that different patterns are found across the world because some people have regulations and others don’t. Some people are addicted and others know how to relegate themselves and attend to their priorities.

Week 11

Social Cybersecurity that influences all aspects of life, including military affairs. The social aspect of cyber security can increase the threat between nations. Technology empowers different kinds of people that can change the way they act socially around people. Technology can also influence people who don’t have it, for example Russia uses cyber technology to influence people inside and outside the country. When the Russian Ukraine war started they would hack into Ukrainian servers and shut them down, same with Russian servers. In China they have control over all the servers and make sure they know what goes out and what comes in. this can influence the social aspect of the military by giving them more power over the people, this is often called a megalomaniac. It helps because they don’t need a physical presences to do any of this.

Week 11 part 2

A cybersecurity analysis relates to the social sciences of cybersecurity in many ways. They have a lot of responsibilities when it comes to making sure people a secure in computer networks. They’re responsible for protecting systems and computer networks. It relates to cyber security because they have to do incident responses, monitor, and do risk assessments. All these have something to do with cybersecurity and there are many more ways that an analysis relates to cyber security.

Week 12 part 1

The theories that relate to this letter are Rational choice theory, game theory, social cognitive theory, and diffusion of innovation theory. They help understand the dynamics behind data breaches and the social factors the hackers use for data breaches. RCT means that people will act in what is in their best interest, so if a hacker would want to breach an organization just for fun then they would do it because it is in their best interest. Game theory analysis the strategic interactions between hackers. Social cognitive theory can explain how individuals learn security and how to hack based on behavior from people they look up too. Diffusion of innovation theory can explain data breaches and shed light on new ways of technology and security.

Week 12 part 2

Bug bounty hunters can be a good and bad thing, there are many policies in place that restrict what they do. They check company codes to make sure that there are no vulnerabilities and tell the company to make sure their code is up to date. The literature review discusses the nature of a bounty hunter and the cost benefits of it. The policies are designed to align the views of the hackers and the companies Policies are important so hackers don’t release the broken code to somebody else or install malware in the code that could put the company at high risk. So policy makers make sure that they implement effect programs to strengthen cybersecurity integrity.

Week 13

Out of the eleven serious violations that people do online there are five that stand out the most. The most serious is collecting information about a child, I think this is the most serious because it’s a child and having a child’s information can put them at risk. Number two is sharing password, addresses or photos of others, this can cause security problems and can harm a whole family and business. Number 3 is Bullying and trolling, this can cause other people to take actions that aren’t good for anybody, some examples are fights, gang violence, and suicide. Number four is using torrent services because people can intercept other people’s information without them knowing which can harm people and families and cause people to lose their identities. The last one is faking your identity online, although it can be easy to figure out when somebody is faking their identity, some people fall for it and end up giving them money and services that the scammer doesn’t need. Faking an identity online relates to somebody pretending to need help on the street but really their living fine and have a job.

Week 15

The career of digital forensics investigators relate to the social sciences in many ways. The speakers pathway to his career is good and gives way for many people to accomplish their goals regarding cyber security. Digital forensics allowed him to use human interactions along with computer interactions in order to better understand how people work online.