Journal Entries

CYSE 201S – Weekly Journal #1 Spring 2025

The career that I am thinking about pursuing in the future is vulnerability management or cyber analyst. The areas that I would want to focus on the most to reach those two careers are implementation & operations and protection and defense. Implementation & operations will help me understand how to configure networks and what maintenance could be needed in case the network is damaged. Furthermore, protection and defense will help me identify risks and respond to real-time cybercrimes. Some skills needed for vulnerability management and cyber analyst include reviewing logs, risk assessments, and recognizing vulnerabilities. For example, sending out a notice to employees to be on alert for potential phishing emails to prevent cybercrimes.

CYSE 201S – Weekly Journal #2 Spring 2025

Relativism can relate to cybersecurity because cybersecurity expands into multiple types
of disciplines to help progress forward. Objectivity can relate to cybersecurity because they both
are strict about advancing knowledge and not opinions. Parsimony can relate to cybersecurity
because being concise while explaining complicated terms from the cybersecurity discourse
community is a required skill in cybersecurity. Empiricism can relate to cybersecurity because
cybersecurity uses the five senses to understand what actions or senses could lead them to be a
victim of hacking. Skepticism can relate to cybersecurity because there are multiple ways
hackers can get people’s information, so it is important to be skeptical of emails or websites that
seem a little off. Ethical Neutrality can relate to cybersecurity because cybersecurity employees
need to have strong ethics when managing client’s information. Determinism can relate to
cybersecurity because cybersecurity uses past events going all the way back to childhood to
understand what could lead people to become a hacker.

CYSE 201S – Weekly Journal #3 Spring 2025


To start, researchers would use public information about data breaches to understand how
companies become victims of cyberattacks, what kind of malware was used, and what workable
solutions can be used to prevent future cyber attacks from happening. Researchers would use
public information about data breaches to understand how companies become victims of
cyberattacks because there are many ways hackers can get past companies’ security. For
example, phishing is a popular method used by hackers because employees click on the link that
spreads malware thinking that it is an email by someone from the company. With more
information about what methods and the quantitative numbers of how many companies’ data
breaches are happening to, then researchers can provide a more concrete answer on how to deal
with data breaches.

CYSE 201S – Weekly Journal #4 Spring 2025


Maslow’s Hierarchy of Needs includes physiological needs, safety needs, belongingness
and love needs, esteem needs, and self-actualization. I can relate physiological needs with my
technology experience by using electric microwaves and ovens to make food. I can relate safety
needs with my technology experience by installing a security alarm for my house. I can relate
belongingness and love needs with my technology experience by playing video games with my
friends online, I can relate esteem needs with my technology experience by using Canvas to
complete a project for a college class. Lastly, I can self-actualization needs with my technology
experience by applying for cybersecurity internships using LinkedIn and the USA Jobs website.

CYSE 201S – Weekly Journal #5 Spring 2025


The first individual motive that makes the most sense to me is multiple reasons because
everyone’s life is different and there could be multiple factors that could lead someone to a life
of cybercrime. The second individual motive that makes the most sense to me is for money
because a need for quick money can easily lead people to cybercrime. The third individual
motive that makes the most sense to me is political reasons because it is common for people to
have strong opinions when it comes to politics which could lead people to commit cybercrimes.
The fourth individual motive that makes the most sense to me is revenge because today it is
common for people to spread private photos on social media to get revenge on somebody for any
reason. The fifth individual motive that makes the most sense to me is recognition because some
people like the attention big cybercrimes could bring them. The sixth individual motive that
makes the most sense to me is entertainment because some people genuinely enjoy the thrill of
getting through securities and committing cybercrimes. The last individual motive that makes the
most sense to me is boredom because there are other things that you could do in life than commit
cybercrimes.

CYSE 201S – Weekly Journal #6 Spring 2025

CYSE 201S – Weekly Journal #7 Spring 2025

Explanation – Human factors are implemented into cybersecurity because humans are the
weakest link in cybersecurity. Specifically, those who do not have common knowledge of
cybersecurity. Furthermore, the password “111111” is a secure password to someone to who
does not have knowledge of cybersecurity.

Explanation: This meme is another example of a lack of basic cybersecurity knowledge. Individuals without basic cybersecurity knowledge are more vulnerable and suitable targets for hackers. The man in the meme clicked a pop-up ad saying the he won a free iPhone 16 Max, but it was a DDoS attack.

Explanation – This meme relates to Maslow’s Hierarchy of Needs. Belongingness and love is the third level on the hierarchy which prioritizes intimate relationships and friends. The lady in the meme is excited that she made new friends on Instagram which fulfilled her Belongingness and love needs.

CYSE 201S – Weekly Journal #8 Spring 2025

The media has a considerable influence on our understanding of cybersecurity due to the
lack of common knowledge about cybersecurity and the media being the common way for
people outside of the cybersecurity discourse community to see an example of cybersecurity for
the first time. In the video, Keren analyzed multiple shows and movies that used cybersecurity as
its theme. Some of the movies/shows had accurate cybersecurity terms and events like capture
the flag competitions and C2 (command and control). The media tends to stray away from using
nonfiction cybersecurity terms in shows and movies because they want to excite the audience by
adding more fiction elements to cybersecurity movies.

CYSE 201S – Weekly Journal #9 Spring 2025

After taking the Social Media Disorder Scale quiz, I had to 2-5 yes answers which means
I have a risky usage of social media. The themes used in the nine questions of the SMDS quiz
was preoccupation, tolerance, withdrawal, persistence, displacement, problems, deception,
escape, conflict. I think that these items do well at trying to measure the mental state of the
individual taking the quiz. For example, the question for withdrawal was “Do you feel restless,
irritable, felt bad or upset when you are unable to use social media?”, which highlights the
individual’s behavior towards lack of social media. I believe there are different patterns from
across the world because everyone has a different upbringing and exposure to social media.

CYSE 201S – Weekly Journal #10 Spring 2025

CYSE 201S – Weekly Journal #11 Spring 2025

CYSE 201S – Weekly Journal #12 Spring 2025

CYSE 201S – Weekly Journal #13 Spring 2025

CYSE 201S – Weekly Journal #14 Spring 2025

After reading eleven things internet users do that may be illegal, the five violations that I
think are the most serious are bullying and trolling, sharing other’s passwords, faking your
identity online, collecting information on children, and illegal searches on the internet. Bullying
and trolling can lead the victim into a state of depression and cause them to not be able to
perform their daily tasks. Sharing other’s passwords is a serious violation because it will allow
anyone access to their personal information leaving them vulnerable. Faking your identity is a
serious violation because using someone else’s personal information to pose as them can damage
their reputation and career. Collecting information on children is a serious violation because
children have no way of protecting themselves and this could lead to child predators attacking
them. Illegal searches on the internet can be a serious violation because it could allow criminals
access to dangerous weapons and personal information.

CYSE 201S – Weekly Journal #15 Spring 2025

Leave a Reply

Your email address will not be published. Required fields are marked *