Journal Entries

Week 1

Week 2

Week 3

Week 4

Maslow’s Hierarchy of needs can be directly related to my experiences with technology. Physiological needs- Online services such as medical apps and records ensures easy access to doctors and other medical information, which contributes to keeping up with my overall health. Safety Needs- I rely on cybersecurity measures such as 2FA and antivirus software to keep my personal information safe and protected. Love and Belonging- social media and communication apps allows me to easily stay in contact with my friends and family, while also providing the opportunity to potentially connect with new people. Esteem Needs- Social media platforms offer the opportunity to show off different skills, or anything you personally would like to receive validation for, enhancing confidence. Self-Actualization- I am able to complete my schoolwork as well as prepare for different certifications in the cybersecurity field which allows for personal and intellectual growth. Technology plays a major role in shaping both academic and personal needs for millions of people. 

Week 5

After reviewing the articles, I ranked the motives for cybercrime from most to least compelling:

1. Financial motivation- hackers attack organizations for personal financial gain.

2. Political motivation- Hacker’s attack organizations to promote personal, political, or social agendas.

3. Revenge- Personal grudges and issues can drive individuals to hack and compromise systems. 

4. Recognition- Some individuals simply seek quick fame by carrying out high profile attacks. 

5. Entertainment- Individuals may hack for fun or personal leisure without negative intentions.

6. Boredom- Individuals may hack for a simple thrill. 

7. Multiple Reasons- Hackers may combine a number of personal motivators such as financial gain and recognition to carry out attacks. 

This ranking explains the different motives behind cybercrimes. 

Week 6

Recognizing fraudulent websites is crucial in protecting personal information. For example, the fake site “paypa1.com” closely resembles “paypal.com” just as “amaz0n.com” and “n1ke.com” are designed to trick users into believing they are using “amazon.com” and “nike.com”. Scammers create these deceptive sites by making minor alterations to legitimate URLs, hoping users will not notice. Moving too quickly or being unfamiliar with a brand increases the risk of falling victim to such scams. Another red flag is the lack of a secure certificate such as HTTPS. Legitimate websites use encryption meant to protect personal information. Always double-check URLs and look for security indicators to stay safe. 

How to Identify Fake Websites | DigiCert

Difference Between Cybersquatting And Typosquatting​ // Bytescare

usenixsecurity24-acharya.pdf

Week 7

Week 8

The media often waters down cybersecurity, creating unrealistic stereotypes about hacking. Many movies and TV shows portray hacking as a quick and easy process, only requiring a push of a few buttons to hack into highly secure systems. Obviously, this is far from the truth. Hacking requires extensive knowledge, practice, time, and patience. These simplified processes shown on TV can misinform the public of what cybersecurity truly consists of. Many people may automatically associate hacking with a cold dark room with feelings of somber. While some shows do try to more realistically show what cybersecurity consists of, as a whole it is often extremely simplified compared to real life processes. I believe this heavily affects how individuals approach cybersecurity, and there should be more awareness of the true processes required to hack or work in a cybersecurity role. 

Week 9

After watching the video and completing the social media disorder scale, I scored moderately low, showing that social media use does not significantly affect my day-to-day life. I found the items on the scale insightful, as they address the negative impacts of excessive social media use, including loss of control and neglecting your responsibilities. I think the differences in social media disorder patterns across the world are affected by the cultures you are raised in, access to technology, and societal norms. In some areas, everyday social media use may be normalized or seen as a primary mean of communication, while in others, face-to-face interactions are more common. 

Week 10

This article on social cybersecurity discusses how attackers use social media and online platforms to manipulate people and create division. I learned from this article that cyber threats are not just about hacking systems but also about intentionally spreading misinformation to cause confusion and distrust. This made me realize that defending against cyber threats requires more than just technical skills—education and awareness are vital to keeping people protected from these kinds of threats. It’s crucial for the government and organizations to provide proper training and policies to help reduce vulnerability to fake news and other social threats. By promoting critical thinking and media literacy, we can better equip individuals to recognize and resist misinformation. 

Week 11

The video about the cybersecurity analyst job highlights how social interactions and human behavior play a major role in the field. One key theme is teamwork, as analysts often collaborate with peers to identify and respond to threats. Strong communication skills are also essential for explaining complex concepts to non-technical colleagues and for working effectively in group settings. Understanding social engineering tactics is crucial because attackers often exploit uneducated users to gain system access. Analysts must remain highly vigilant and socially aware to minimize vulnerabilities, making both social awareness and technical skills equally important.

Week 12

The sample data breach notification letter demonstrates how both economic and social science theories are applied in real-world situations. From an economic perspective, cost-benefit analysis plays a role as the company must evaluate the financial consequences of the breach, including legal liability, reputation damage, and the cost of customer notification. Information asymmetry is also relevant—the letter aims to reduce the knowledge gap between the business and its customers. Social science theories like trust theory highlight the importance of maintaining customer relationships after a breach, while crisis communication theory emphasizes transparent, timely messaging to manage public response and restore organizational credibility.

Week 13

The article presents a strong case for the effectiveness and economic logic behind bug bounty programs. The literature review shows that these policies are built on the idea of incentivizing ethical hackers to identify vulnerabilities, which can be a cost-effective alternative to traditional security methods. What stood out to me in the findings was that even lower bounty payments can attract useful participation, meaning smaller organizations can still benefit. It also challenges the assumption that only large, well-known companies will succeed with these programs. Overall, bug bounties represent a smart way to crowdsource security while managing costs and reducing risk.

Week 14

Among the eleven online actions listed in Clario’s article, the five most serious violations are cyberbullying, accessing the dark web, illegal streaming or torrenting, hacking, and purchasing illegal goods online. These offenses are particularly severe due to their harmful social, legal, and ethical consequences. Cyberbullying can lead to emotional trauma, mental health issues, and even suicide among victims, making it a serious threat to personal well-being. Accessing the dark web often leads users into illegal marketplaces and dangerous activities, including exposure to drugs, weapons, and exploitative materials. Illegal streaming and torrenting violate copyright laws, undermining creators’ rights and causing significant financial loss to the entertainment industry. Hacking involves unauthorized access to computer systems, threatening national security, corporate integrity, and personal privacy. Lastly, purchasing illegal goods online fuels criminal enterprises and contributes to the spread of harmful substances and counterfeit products. These actions not only break laws but also jeopardize public safety and trust in digital spaces.

Week 15

After watching Davin Teo’s TEDx talk on digital forensics, I found his career path both insightful and inspiring. His journey highlights how digital forensics is not just a technical field but one deeply connected to the social sciences. Investigating cybercrimes requires understanding human behavior, motives, and societal patterns, which are core aspects of social science. Teo’s transition into digital forensics shows how critical analytical thinking, curiosity about human actions, and ethical responsibility shape this career. It’s not just about data recovery; it’s about interpreting digital footprints within a broader social context to uncover the truth and deliver justice.