Journal Entries

Journal Entry 1

After reviewing the NICE (National Institution for Cybersecurity Education) framework I believe I would want to focus my career on cyberspace effects. I chose this area because I would love to intercept a hacker from doing catastrophic amounts of damage to a system. If you think about it cyberspace effects is a very important field because if a hacker were to go after a water power plant and cause it to explode it wouldn’t be a positive outcome for people in the path of the water. while with people to infiltrate these hackers and stop them from doing damage is amazing. I don’t really have a area that I wouldn’t like.

Journal Entry 2

Each principle of science relates to cybersecurity in different ways relativism shows that developments in technology lead to developments in cybersecurity. the principle of objectivity relates to Cybersecurity by how hackers should be punished. the principle of parsimony relates to Cybersecurity in the same way that people secure building the simplest and most efficient way is always the best. the principle of empiricism relates to cybersecurity the way that cyber crime analysts don’t go solely off of word of mouth for prosecution. the principle of ethical neutrality relates to cybersecurity because standards and morals for how people do things needs to be enforced in order for things to run smoothly just like the field of Cybersecurity ethics. the principle of determinism relates to cyber security In the same way that it is highly likely that people low self control are more likely to commit cyber crime. skepticism relates to cyber security because cyber security standards need to be updated or they will be completely useless. 

Journal Entry 3

The information on privacy rights.org is massive and covers a wide variety of breaches. I think that researchers could use the statistics alone to find patterns in data breaches and possibly catch them before they happen. I say this because hackers usually go after people for certain reasons like low security, high payout, older people, and large companies. If I were a white hat hackers I would try to get into a medical place with lots of attention so that I can tell people about the problems with their systems that need it. the data breach impact across industries feature is like a insight into the mind of a hacker which is very helpful for a cyber professional to know. 

This image has an empty alt attribute; its file name is cropped-green-matrix-background-2560x1600-wallpaper-1024x410.jpg

Journal Entry 4

If I were to describe how each need relates to technology I would say for basic needs technology needs power, a computer with a GPU and CPU, and wi-fi. In my digital experience basic needs relate to technology when the wifi goes down and I can’t use my laptop to do homework. in terms of safety technology should have multiple firewalls, multi factor authentication, 256 bit encryption, a hash system, and many other things to prevent attacks. just as we lock our doors computers have firewalls. in terms of psychological needs technology hasn’t gotten to the point to have emotions but it does needs other computers and proper connections to achieve it’s most efficient configuration. People want friends and family because they are a great help in achieving greatness computers need other computers to work efficiently. in terms of self fulfillment needs technology needs connections, routers, servers, software, NIC cards, and other systems to achieve greatness. We want people with different points of view, business connections, money, and passion to achieve greatness. 

Journal Entry 5

In terms of ranking the motives i would say 1 would be multiple reasons because people never commit crimes for just one reason its always for money and other things that come along with that money. 2 would be for money because it is the root of all evil and makes people do millions of things. 3 would be political because there are hundreds of millions of people fighting for political injustice and it would make sense if they were using cyber crime to do that just like the Russians were. 4 would be revenge because celebrities have crazy fans and I’m not surprised someone would do somethings like revenge porn. 5 would be recognition because in white hat and black hat hacking people want to be known so that they can get more deals. if you are not a very known hacker no company is going to hire you to test their systems and a black hat hacker will get no praise for what they did by other people. 6 would be boredom i understand that people get bored but to want to commit a cybercrime is not a good reason. 7 would be entertainment I don’t think entertainment is a good reason to commit cybercrime especially with the risks. 

Journal Entry 6

From my research I have found a few fake website examples. According to Lakovics (2024) there was fake websites named paypa1.com, chatgpt4beta.com, and suewhitehurst.shop. Those are the fake versions of the real websites that are PayPal.com, chatgpt.com and nike.com (respectively). The suewhitehurst.shop sold Jordans and Nike shoes but was not a reputable Nike shop, the PayPal website used a fake sign in box that posed as the real website to get banking information, and the chatgpt4beta.com website used a fake websites to get a user to install malware and pay for a fake premium service. The fake websites use techniques like creating website addresses that look similar to the real website like paypa1.com or using fake website interfaces that tell you to do something simple that would make sense on a real website, in order to get you to click a malicious link. The fake websites also have spelling and grammar issues that give them away as fraudulent websites. 

Journal Entry 8

The video pointed out many cybersecurity employees in movies and judges their accuracy to reality. The most interesting part is that most people will watch a movie and think that this is real and what they are seeing is accurate. So for an actual cyber security professional to actually check what the movies are showing people is really breaking the stereotype of what cybersecurity is like. People like me who are cybersecurity majors are even susceptible to this stereotype too because in movies like the matrix  I thought that most cybersecurity jobs would just take you a day but depending on the job it could take multiple days. 

Journal Entry 9

My score was a 4. I feel that if you answer yes to the last question that you have a serious problem with social media regardless of your answers to the other questions. I have also never met anyone with an addiction to social media like this which makes sense because they most likely don’t talk to people very much ,but I would like to talk to someone that has a score of a 9. I believe that different patterns are found all over the world because of the access to technology. Different countries populations have more free time and financial freedom to use technology therefore they have different patterns. 

Journal Entry 10

My analysis of the article on social cybersecurity and emerging nationally security requirement is that it is quite interesting the subject of social cyber security. The field of social cyber security is very important if national security employees are able to “hack” cyber criminals they could forecast their attacks before they even happen. Things like high altitude surveillance drones can monitor people from very far away and I can understand why they are used in wars to gather information. Its interesting that an article on national security has a section on social media bots. This makes me think that national security uses social media as a tool to understand other countries. Which I have seen before with things like Tiktok being geared towards the person viewing content and the possibility that china is collecting this information. 

Journal Entry 11

The position of cybersecurity analyst relates to social behavior when analysts perform actions like surveying the network, finding vulnerabilities, intrusion detection, and monitoring systems . Surveying the network is to makes sure that cyber criminals aren’t invading the system or they are looking for any suspicious behavior. Finding vulnerabilities is a task that requires you to get in the head of a cyber criminal. Intrusion detection also uses this same principle that cyber criminals behave just like the cyber security employees looking for vulnerabilities. Monitoring systems is thinking in the mind of a cyber criminal to understand where an attack will most likely take place. 

Journal Entry 12

The laissez faire economic theory relates to the article when the police got involved and requested that the customers are notified of the breach. The classical economic theory relates to the article because the police are not supposed to get involved with the financials of the data breach and are there purely for investigation. The letter relates to the social principle of parsimony with the wording that is used. The words that were used were known by everyone and not in a niche technical field. The letter relates to the social principle of relativism when the letter states that they don’t know what data was leaked but if a person were to be attacked then they know why. 

Journal Entry 13

The policies on bug bounties is a very cool idea and I look forward to collecting some of these bounties. One of the first ideas I had about bug bounties is that there most likely people using bots or multiple programs to find bounties almost like how bots are used on social media. I imagine that this what white hackers to do make money and the companies profit from it too. It’s also interesting that platforms are created for people that make a living off of finding bugs for companies. The idea that hacker supply is inelastic is interesting ,but it makes sense that new hackers want to take anything they can get and experienced hackers are the opposite. 

Journal Entry 14

I believe one serious violation is faking someone’s identity because of the jail time and damage that could be caused from doing so. I believe another serious violation is collecting information about people younger than 13 years old just because of the jail time and psychological effects. I believe another violation is doxxing someone or sharing the personal information because that could make someone go insane. Another violation is using copyrighted images as your own which can ruin someone’s career and send them to the streets. The last violation is recording someone’s voice without their permission