Week 1
After reviewing the NICE Workforce Framework for Cybersecurity, I think the Protect and Defend category is the most appealing to me. I like that it focuses on detecting threats and responding to incidents because it seems like a hands-on and fast-paced area. I like to solve problems and work on things that can have an immediate impact, so this category feels like a good fit for me. I’m also interested in the analyze category because using data to find patterns and figuring out how attackers work sounds really interesting to me. The securely provision category is the least interesting to me, it focuses more on designing and building secure systems. I feel like I would rather work on defending systems than creating them from scratch.
Week 2
Empiricism, determinism, parsimony, and objectivity are all of the principles of science that are really important in cybersecurity. Empiricism, which is based on observation and evidence, assists with analyzing data to detect cyber threats. Determinism, or the idea that events happen for certain reasons, helps cybersecurity experts determine how attacks happen and predict vulnerabilities. Parsimony, or keeping things simple, is useful when designing security systems, making them easy to manage and less likely to have issues. Objectivity also plays a major role by ensuring decisions are based on facts and not personal opinions, which is really important for fair risk assessments. These principles make it easier to build effective and reliable systems to protect against potential threats.
Week 3
By analyzing the breach data available on PrivacyRights.org, researchers are able to identify trends within cybersecurity incidents, assess common attacks, and evaluate the effectiveness of data protection protocols. This information is critical for studying which industries are targeted the most, the types of data with the highest risk, and how breaches evolve over time. Researchers may also use this data to examine the effects of cybersecurity policies and regulations. This helps to determine the effectiveness in reducing breach incidents. The knowledge gained from these reports contribute to developing evolving risk mitigation strategies, improves incident response plans, and showcases the best strategies to use in cybersecurity. Ultimately, access to real-world scenarios and breach data allows for a better understanding of the evolving cyber threats and allows for enhanced security solutions.
Week 4
Maslow’s Hierarchy of needs can be directly related to my experiences with technology. Physiological needs- Online services such as medical apps and records ensures easy access to doctors and other medical information, which contributes to keeping up with my overall health. Safety Needs- I rely on cybersecurity measures such as 2FA and antivirus software to keep my personal information safe and protected. Love and Belonging- social media and communication apps allows me to easily stay in contact with my friends and family, while also providing the opportunity to potentially connect with new people. Esteem Needs- Social media platforms offer the opportunity to show off different skills, or anything you personally would like to receive validation for, enhancing confidence. Self-Actualization- I am able to complete my schoolwork as well as prepare for different certifications in the cybersecurity field which allows for personal and intellectual growth. Technology plays a major role in shaping both academic and personal needs for millions of people.
Week 5
After reviewing the articles, I ranked the motives for cybercrime from most to least compelling:
1. Financial motivation- hackers attack organizations for personal financial gain.
2. Political motivation- Hacker’s attack organizations to promote personal, political, or social agendas.
3. Revenge- Personal grudges and issues can drive individuals to hack and compromise systems.
4. Recognition- Some individuals simply seek quick fame by carrying out high profile attacks.
5. Entertainment- Individuals may hack for fun or personal leisure without negative intentions.
6. Boredom- Individuals may hack for a simple thrill.
7. Multiple Reasons- Hackers may combine a number of personal motivators such as financial gain and recognition to carry out attacks.
This ranking explains the different motives behind cybercrimes.
Week 6
Recognizing fraudulent websites is crucial in protecting personal information. For example, the fake site “paypa1.com” closely resembles “paypal.com” just as “amaz0n.com” and “n1ke.com” are designed to trick users into believing they are using “amazon.com” and “nike.com”. Scammers create these deceptive sites by making minor alterations to legitimate URLs, hoping users will not notice. Moving too quickly or being unfamiliar with a brand increases the risk of falling victim to such scams. Another red flag is the lack of a secure certificate such as HTTPS. Legitimate websites use encryption meant to protect personal information. Always double-check URLs and look for security indicators to stay safe.
How to Identify Fake Websites | DigiCert
Difference Between Cybersquatting And Typosquatting // Bytescare
Week 7
Week 8
The media often waters down cybersecurity, creating unrealistic stereotypes about hacking. Many movies and TV shows portray hacking as a quick and easy process, only requiring a push of a few buttons to hack into highly secure systems. Obviously, this is far from the truth. Hacking requires extensive knowledge, practice, time, and patience. These simplified processes shown on TV can misinform the public of what cybersecurity truly consists of. Many people may automatically associate hacking with a cold dark room with feelings of somber. While some shows do try to more realistically show what cybersecurity consists of, as a whole it is often extremely simplified compared to real life processes. I believe this heavily affects how individuals approach cybersecurity, and there should be more awareness of the true processes required to hack or work in a cybersecurity role.
Week 9
After watching the video and completing the social media disorder scale, I scored moderately low, showing that social media use does not significantly affect my day-to-day life. I found the items on the scale insightful, as they address the negative impacts of excessive social media use, including loss of control and neglecting your responsibilities. I think the differences in social media disorder patterns across the world are affected by the cultures you are raised in, access to technology, and societal norms. In some areas, everyday social media use may be normalized or seen as a primary mean of communication, while in others, face-to-face interactions are more common.
Week 10
This article on social cybersecurity discusses how attackers use social media and online platforms to manipulate people and create division. I learned from this article that cyber threats are not just about hacking systems but also about intentionally spreading misinformation to cause confusion and distrust. This made me realize that defending against cyber threats requires more than just technical skills—education and awareness are vital to keeping people protected from these kinds of threats. It’s crucial for the government and organizations to provide proper training and policies to help reduce vulnerability to fake news and other social threats. By promoting critical thinking and media literacy, we can better equip individuals to recognize and resist misinformation.
Week 11
The video about the cybersecurity analyst job highlights how social interactions and human behavior play a major role in the field. One key theme is teamwork, as analysts often collaborate with peers to identify and respond to threats. Strong communication skills are also essential for explaining complex concepts to non-technical colleagues and for working effectively in group settings. Understanding social engineering tactics is crucial because attackers often exploit uneducated users to gain system access. Analysts must remain highly vigilant and socially aware to minimize vulnerabilities, making both social awareness and technical skills equally important.
Week 12
The sample data breach notification letter demonstrates how both economic and social science theories are applied in real-world situations. From an economic perspective, cost-benefit analysis plays a role as the company must evaluate the financial consequences of the breach, including legal liability, reputation damage, and the cost of customer notification. Information asymmetry is also relevant—the letter aims to reduce the knowledge gap between the business and its customers. Social science theories like trust theory highlight the importance of maintaining customer relationships after a breach, while crisis communication theory emphasizes transparent, timely messaging to manage public response and restore organizational credibility.
Week 13
The article presents a strong case for the effectiveness and economic logic behind bug bounty programs. The literature review shows that these policies are built on the idea of incentivizing ethical hackers to identify vulnerabilities, which can be a cost-effective alternative to traditional security methods. What stood out to me in the findings was that even lower bounty payments can attract useful participation, meaning smaller organizations can still benefit. It also challenges the assumption that only large, well-known companies will succeed with these programs. Overall, bug bounties represent a smart way to crowdsource security while managing costs and reducing risk.
Week 14
Among the eleven online actions listed in Clario’s article, the five most serious violations are cyberbullying, accessing the dark web, illegal streaming or torrenting, hacking, and purchasing illegal goods online. These offenses are particularly severe due to their harmful social, legal, and ethical consequences. Cyberbullying can lead to emotional trauma, mental health issues, and even suicide among victims, making it a serious threat to personal well-being. Accessing the dark web often leads users into illegal marketplaces and dangerous activities, including exposure to drugs, weapons, and exploitative materials. Illegal streaming and torrenting violate copyright laws, undermining creators’ rights and causing significant financial loss to the entertainment industry. Hacking involves unauthorized access to computer systems, threatening national security, corporate integrity, and personal privacy. Lastly, purchasing illegal goods online fuels criminal enterprises and contributes to the spread of harmful substances and counterfeit products. These actions not only break laws but also jeopardize public safety and trust in digital spaces.
Week 15
After watching Davin Teo’s TEDx talk on digital forensics, I found his career path both insightful and inspiring. His journey highlights how digital forensics is not just a technical field but one deeply connected to the social sciences. Investigating cybercrimes requires understanding human behavior, motives, and societal patterns, which are core aspects of social science. Teo’s transition into digital forensics shows how critical analytical thinking, curiosity about human actions, and ethical responsibility shape this career. It’s not just about data recovery; it’s about interpreting digital footprints within a broader social context to uncover the truth and deliver justice.