CYSE201S

Journal Entry #1

After Reviewing the NICE Workforce Framework, i believe my certain area i would be a Cyber Crime Analyst. With having to take a Criminology class as my prerequisites , I soon grew to love it. Seeing how people thought and why they did cybercrime. It was like seeing inside the mind of a criminal and doing. I’ve also seen and felt this way with the Social Science class with Cybersecurity. I saw the social side and the behaviors of cybercriminals. With this being said I soon believe that I’m going into the field of Cybersecutty as a Cyber Crime Analyst. With having more interest in the behavioral side of cybersecurity this would be the best choice for my future. It was the psychological part I fell for. The main skill for this would be being able to know Cyber Threat intelligence.  Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors. This both shows the Cyber intelligence side and the human physical behavioral side.


Journal Entry #2

Question: Explain how the principles of science relate to cybersecurity


The principles of science are fundamental to understanding, analyzing, and addressing cybersecurity challenges. Applying scientific principles provides a systematic and evidence-based approach to studying and mitigating cyber threats.

With one of my favorite science principle being hypothesis, hypothesis testing involves formulating a hypothesis and conducting experiments to validate or refute it. In cybersecurity, hypotheses are formulated about potential vulnerabilities, threat actors, or attack vectors. Security researchers test hypotheses through controlled experiments, simulations, or threat intelligence analysis to validate their assumptions and refine security measures.


Journal Entry #3

Question: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

From overveiwing Privacy Rights website i see that data goes all the way back to 2005 for data breaches. I believe the study of these data breaches can be used as a predictable model. Predictive modeling uses data to develop models that can forecast future events. In cybersecurity, predictive modeling helps anticipate potential cyber threats and vulnerabilities. Machine learning and data analytics are used to create predictive models that can identify anomalies, predict emerging threats, and enhance proactive cybersecurity measures.


Journal Entry #4

Question: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.


Journal Entry #5

Question: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.


Journal Entry #6

Question: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Spotting a real website from a fake one is crucial to protect yourself from scams, phishing, and other cyber threats. Legitimate websites provide clear and accurate contact information, including a physical address, phone number, and email address. Fake websites may lack this information or provide vague details. Look at the website’s URL. Legitimate websites often have simple and clear domain names. Be cautious of URLs with misspelled words, extra characters, or domains that mimic well-known brands. Legitimate websites often have professional designs, clear layouts, and high-quality content. Be suspicious of websites with poor design, numerous spelling and grammar mistakes, or copied content from other sources.


Journal Entry #7

Question: Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.


Journal Entry #8

Question: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.


Keren Elazari is an internationally recognized security analyst, researcher, author, and speaker who works with leading security firms, government organizations, and Fortune 500 companies. With what i’ve observed from her opinions with whats real and fake, I believe media influence shows us 40% real and 60% false. I got this rating because in movies they use real cybersecurity terms such as Malware, Trojan, and code obfuscation. Even though these things can be educating, media outlets sometimes use sensational language and fear-inducing narratives to report on cybersecurity incidents. This can contribute to a heightened sense of fear and anxiety among the public.


Journal Entry #9

Question: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

After reviewing and scoring 4/9 of the social media questions, i would say my scale of social media disorver would be mild.

I do: regularly found that you can’t think of anything else but the moment that you will be able to use
social media again. Tried to spend less time on social media, but failed? Regularly lied to your parents or friends about the amount of time you spend on social media? And often used social media to escape from negative feelings?

I think the items on my list is average for my age and generation of technology. I think different patterns are found different around the world because many aren’t able to gain access to technologies.


Journal Entry #10

Question: Read this and write a journal entry summarizing your response to the article on social cybersecurity. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-

From a national security perspective, the concept of “Social Cybersecurity” involves understanding and addressing the social aspects of cybersecurity threats that have implications for a nation’s security. This includes safeguarding against cyber threats that exploit human behaviors, social engineering tactics, and the manipulation of public opinion. National security is closely tied to the protection of critical infrastructure. Social Cybersecurity considers the human element in critical infrastructure protection, addressing vulnerabilities related to personnel, public awareness, and potential social engineering threats targeting critical systems.



Journal Entry #11

Question: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay
individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration
testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.


Journal Entry #12

Question: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

  1. Sharing Passwords, Addresses, or Photos of Others

I believe this factor should be more of an ethical issue on how bad this can increase overtime. Sharing passwords can be an innocent act as in sharing Netflix passwords. It could also be harmful if it’s on purpose as in sharing Bank information.

2. Faking Your Identity Online

Faking someone Identity can be seen as “Trolling” but also harmful if they’re pretending be someone of an important network.

3. Collecting Information About People Younger Than 13

I would consider this a serious offense. Without verifiable consent from parents/guardians, it’s 100% illegal and weird.

4. Illegal Searches on the Internet

This would go down without he Dark Web or searches that could cause harm to other individuals. For example, if someone is convicted of a homicide crime and their search matches on how they were success, that would symbolize as illegal in my book.

5. Use a Virtual Private Network (VPN)

By using a VPN, you can protect yourself from something illicit or controversial. Imagine accidentally looking at illegal material on the internet but realizing it too late.


Journal Entry #14

Question: Write a journal entry describing what you think about the speaker’s pathway to his career.