{"id":371,"date":"2024-12-08T17:37:47","date_gmt":"2024-12-08T17:37:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/?p=371"},"modified":"2025-04-30T03:52:56","modified_gmt":"2025-04-30T03:52:56","slug":"journal-entries","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/2024\/12\/08\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>CYSE 201S &#8211; Weekly Journal #1 Spring 2025<\/p>\n\n\n\n<p>The career that I am thinking about pursuing in the future is vulnerability management or cyber analyst. The areas that I would want to focus on the most to reach those two careers are implementation &amp; operations and protection and defense. Implementation &amp; operations will help me understand how to configure networks and what maintenance could be needed in case the network is damaged. Furthermore, protection and defense will help me identify risks and respond to real-time cybercrimes. Some skills needed for vulnerability management and cyber analyst include reviewing logs, risk assessments, and recognizing vulnerabilities. For example, sending out a notice to employees to be on alert for potential phishing emails to prevent cybercrimes.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #2 Spring 2025<br><\/p>\n\n\n\n<p>Relativism can relate to cybersecurity because cybersecurity expands into multiple types<br>of disciplines to help progress forward. Objectivity can relate to cybersecurity because they both<br>are strict about advancing knowledge and not opinions. Parsimony can relate to cybersecurity<br>because being concise while explaining complicated terms from the cybersecurity discourse<br>community is a required skill in cybersecurity. Empiricism can relate to cybersecurity because<br>cybersecurity uses the five senses to understand what actions or senses could lead them to be a<br>victim of hacking. Skepticism can relate to cybersecurity because there are multiple ways<br>hackers can get people\u2019s information, so it is important to be skeptical of emails or websites that<br>seem a little off. Ethical Neutrality can relate to cybersecurity because cybersecurity employees<br>need to have strong ethics when managing client\u2019s information. Determinism can relate to<br>cybersecurity because cybersecurity uses past events going all the way back to childhood to<br>understand what could lead people to become a hacker.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #3 Spring 2025<\/p>\n\n\n\n<p><br>To start, researchers would use public information about data breaches to understand how<br>companies become victims of cyberattacks, what kind of malware was used, and what workable<br>solutions can be used to prevent future cyber attacks from happening. Researchers would use<br>public information about data breaches to understand how companies become victims of<br>cyberattacks because there are many ways hackers can get past companies\u2019 security. For<br>example, phishing is a popular method used by hackers because employees click on the link that<br>spreads malware thinking that it is an email by someone from the company. With more<br>information about what methods and the quantitative numbers of how many companies\u2019 data<br>breaches are happening to, then researchers can provide a more concrete answer on how to deal<br>with data breaches.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #4 Spring 2025<\/p>\n\n\n\n<p><br>Maslow\u2019s Hierarchy of Needs includes physiological needs, safety needs, belongingness<br>and love needs, esteem needs, and self-actualization. I can relate physiological needs with my<br>technology experience by using electric microwaves and ovens to make food. I can relate safety<br>needs with my technology experience by installing a security alarm for my house. I can relate<br>belongingness and love needs with my technology experience by playing video games with my<br>friends online, I can relate esteem needs with my technology experience by using Canvas to<br>complete a project for a college class. Lastly, I can self-actualization needs with my technology<br>experience by applying for cybersecurity internships using LinkedIn and the USA Jobs website.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #5 Spring 2025<\/p>\n\n\n\n<p><br>The first individual motive that makes the most sense to me is multiple reasons because<br>everyone\u2019s life is different and there could be multiple factors that could lead someone to a life<br>of cybercrime. The second individual motive that makes the most sense to me is for money<br>because a need for quick money can easily lead people to cybercrime. The third individual<br>motive that makes the most sense to me is political reasons because it is common for people to<br>have strong opinions when it comes to politics which could lead people to commit cybercrimes.<br>The fourth individual motive that makes the most sense to me is revenge because today it is<br>common for people to spread private photos on social media to get revenge on somebody for any<br>reason. The fifth individual motive that makes the most sense to me is recognition because some<br>people like the attention big cybercrimes could bring them. The sixth individual motive that<br>makes the most sense to me is entertainment because some people genuinely enjoy the thrill of<br>getting through securities and committing cybercrimes. The last individual motive that makes the<br>most sense to me is boredom because there are other things that you could do in life than commit<br>cybercrimes.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #6 Spring 2025<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #7 Spring 2025<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"593\" src=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-1.png\" alt=\"\" class=\"wp-image-414\" style=\"width:447px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-1.png 975w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-1-300x182.png 300w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-1-768x467.png 768w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-1-493x300.png 493w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Explanation \u2013 Human factors are implemented into cybersecurity because humans are the<br>weakest link in cybersecurity. Specifically, those who do not have common knowledge of<br>cybersecurity. Furthermore, the password \u201c111111\u201d is a secure password to someone to who<br>does not have knowledge of cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"644\" src=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-2.png\" alt=\"\" class=\"wp-image-415\" style=\"width:365px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-2.png 975w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-2-300x198.png 300w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-2-768x507.png 768w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/image-2-454x300.png 454w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Explanation: This meme is another example of a lack of basic cybersecurity knowledge. Individuals without basic cybersecurity knowledge are more vulnerable and suitable targets for hackers. The man in the meme clicked a pop-up ad saying the he won a free iPhone 16 Max, but it was a DDoS attack.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"721\" height=\"968\" src=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/Screenshot-2025-04-29-230430.png\" alt=\"\" class=\"wp-image-416\" style=\"width:199px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/Screenshot-2025-04-29-230430.png 721w, https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-content\/uploads\/sites\/35659\/2025\/04\/Screenshot-2025-04-29-230430-223x300.png 223w\" sizes=\"(max-width: 721px) 100vw, 721px\" \/><\/figure>\n\n\n\n<p>Explanation \u2013 This meme relates to Maslow\u2019s Hierarchy of Needs. Belongingness and love is the third level on the hierarchy which prioritizes intimate relationships and friends. The lady in the meme is excited that she made new friends on Instagram which fulfilled her Belongingness and love needs.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #8 Spring 2025<\/p>\n\n\n\n<p>The media has a considerable influence on our understanding of cybersecurity due to the<br>lack of common knowledge about cybersecurity and the media being the common way for<br>people outside of the cybersecurity discourse community to see an example of cybersecurity for<br>the first time. In the video, Keren analyzed multiple shows and movies that used cybersecurity as<br>its theme. Some of the movies\/shows had accurate cybersecurity terms and events like capture<br>the flag competitions and C2 (command and control). The media tends to stray away from using<br>nonfiction cybersecurity terms in shows and movies because they want to excite the audience by<br>adding more fiction elements to cybersecurity movies.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #9 Spring 2025<\/p>\n\n\n\n<p>After taking the Social Media Disorder Scale quiz, I had to 2-5 yes answers which means<br>I have a risky usage of social media. The themes used in the nine questions of the SMDS quiz<br>was preoccupation, tolerance, withdrawal, persistence, displacement, problems, deception,<br>escape, conflict. I think that these items do well at trying to measure the mental state of the<br>individual taking the quiz. For example, the question for withdrawal was \u201cDo you feel restless,<br>irritable, felt bad or upset when you are unable to use social media?\u201d, which highlights the<br>individual\u2019s behavior towards lack of social media. I believe there are different patterns from<br>across the world because everyone has a different upbringing and exposure to social media. <\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #10 Spring 2025<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #11 Spring 2025<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #12 Spring 2025<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #13 Spring 2025<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #14 Spring 2025<\/p>\n\n\n\n<p>After reading eleven things internet users do that may be illegal, the five violations that I<br>think are the most serious are bullying and trolling, sharing other\u2019s passwords, faking your<br>identity online, collecting information on children, and illegal searches on the internet. Bullying<br>and trolling can lead the victim into a state of depression and cause them to not be able to<br>perform their daily tasks. Sharing other\u2019s passwords is a serious violation because it will allow<br>anyone access to their personal information leaving them vulnerable. Faking your identity is a<br>serious violation because using someone else\u2019s personal information to pose as them can damage<br>their reputation and career. Collecting information on children is a serious violation because<br>children have no way of protecting themselves and this could lead to child predators attacking<br>them. Illegal searches on the internet can be a serious violation because it could allow criminals<br>access to dangerous weapons and personal information.<\/p>\n\n\n\n<p>CYSE 201S &#8211; Weekly Journal #15 Spring 2025<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 201S &#8211; Weekly Journal #1 Spring 2025 The career that I am thinking about pursuing in the future is vulnerability management or cyber analyst. The areas that I would want to focus on the most to reach those two careers are implementation &amp; operations and protection and defense. Implementation &amp; operations will help me&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/2024\/12\/08\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":28545,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts\/371"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/users\/28545"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts\/371\/revisions"}],"predecessor-version":[{"id":417,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts\/371\/revisions\/417"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/media?parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/categories?post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/tags?post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}