{"id":302,"date":"2024-12-09T03:21:12","date_gmt":"2024-12-09T03:21:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/?page_id=302"},"modified":"2024-12-09T03:50:01","modified_gmt":"2024-12-09T03:50:01","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Journal Entry 1<\/h2>\n\n\n\n<p>After reviewing the NICE Framework, I have concluded that I would enjoying focusing on the \u201cProtect and Defense\u201d aspect of the Framework simply because being able to maintain the integrity of a companies\u2019 network and data is something that aligns with my goals as far as professions go. This area of work is responsible for protecting against, identifying, and analyzing risks to systems such as computers or servers or networks. The idea of being the line of defense against cyber threats is especially appealing to me. It\u2019s about constantly assessing and responding to potential risks before they cause harm. Protecting sensitive information like intellectual property, customer data, or financial records, makes working in this field highly motivating. The idea that a single vulnerability can cause an entire organization to have to shut down and close its operations, brings a sense of responsibility and purpose, knowing that what I do has a direct impact on the company\u2019s stability and success.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 2<\/h2>\n\n\n\n<p>Social science helps in cybersecurity by focusing on how people behave and<br>make decisions. Hackers often trick people into giving away personal<br>information through social engineering, like phishing, so knowing how people<br>think helps stop these attacks. It also helps us understand how people view<br>risks, which can improve security training and policies. Building a strong<br>security culture in workplaces makes sure everyone follows the rules.<br>Understanding trust and privacy is important too, as it helps design systems<br>that prevent mistakes and keep data safe. In short, social science helps us<br>protect against cyber threats by focusing on human factors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 3<\/h2>\n\n\n\n<p>Researchers can the information from the site \u201cPrivacyRights.org\u201d to look for<br>certain patterns in the data breaches provided by the website. By studying<br>what happens and how it happens in each case, they will be able to find<br>some common reasons as to why these breaches occurred, examples of such<br>reason would be, weak security or human error such as someone falling for a<br>phishing scam. This can help the researchers understand how attackers were<br>able to gain access into these systems and identify the mistakes made and<br>sort of come up with a future to stop more data breaches from happening in<br>the same way. They can also study how the breaches change over time,<br>which would also help create better defenses to stop future breaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 4<\/h2>\n\n\n\n<p>Maslow\u2019s Hierarchy of Needs consists of five levels, each of which can be related to<br>personal experiences with technology:<br><strong>1. Physiological Needs:<\/strong> Technology meets basic needs like food and shelter<br>through apps for grocery delivery or housing platforms. For example, I use apps<br>like Grubhub to order food from the Webb center and apple maps to find things I<br>need.<br><strong>2. Safety Needs:<\/strong> Digital tools provide security through services like antivirus<br>software or two-factor authentication like Duo mobile, which I use to protect<br>almost all my data and schoolwork.<br><strong>3. Love and Belongingness:<\/strong> social media, messaging apps, and online<br>communities help fulfill social connections. My use of platforms like Discord lets<br>me interact with friends and find people that share the same interest with me.<br><strong>4. Esteem Needs: <\/strong>Achievements in games, gaining followers on twitch, or<br>professional recognition through platforms like LinkedIn boost self-esteem.<br>Completing goals in games like Trove and Osu! has given me a sense of<br>accomplishment.<br><strong>5. Self-Actualization:<\/strong> Technology enables personal growth through access to<br>knowledge and creativity tools. For instance, I use coding platforms like Vscode<br>and creative apps such as Unity or PowerPoint to work on projects like game<br>development and cybercrime presentations.<br>Each level highlights how technology supports my fundamental and higher-level needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 5<\/h2>\n\n\n\n<p>Ranking the motives behind cybercrimes from most to least logical:<br><strong>1. For money:<\/strong> Financial gain is the most practical motive, as hackers can directly<br>benefit from stolen funds, like in the HP report on cybercriminal spending.<br><strong>2. Revenge:<\/strong> People driven by personal grudges, as seen in the revenge porn<br>article, have strong emotions fueling their actions, making this a powerful motive.<br><strong>3. Multiple reasons:<\/strong> The Infosecurity article shows hackers often have complex<br>motivations, combining money, recognition, or revenge, which makes sense as<br>they have several driving factors.<br><strong>4. Political: <\/strong>Hackers with political motives, like in the Economic Times article, want<br>to push an agenda or make a statement, which is a strong but more specific<br>reason.<br><strong>5. Recognition: <\/strong>Some hackers, as in the DDoS attack article, seek fame within<br>their community, but this motive is less tangible and less universal than revenge<br>or money.<br><strong>6. Entertainment:<\/strong> The LinkedIn scraping case shows that some people hack for<br>fun, but this is harder to relate to since it doesn&#8217;t offer much real benefit.<br><strong>7. Boredom:<\/strong> As seen in the HeraldLive article on cyberbullying, hacking out of<br>boredom feels the least justifiable, as it lacks any real purpose or gain.<br>Each ranking reflects how logical and understandable the motive is, with money being<br>the most practical and boredom the least.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 6<\/h2>\n\n\n\n<p>Fake websites often try to copy or mimic real ones but lack authenticity markers.<br>For example, fake URLs usually contain small changes such as \u201cg00gle.com\u201d<br>instead of \u201cgoogle.com\u201d using odd characters or tiny misspellings that make them<br>seem legit. Fake websites also tend to feature huge offers or urgent alerts, that<br>try to make the users give away personal information in one way or another.<br>Another sign of a fake website is the lack of verified contact information. A real<br>site would normally include real email addresses, legitimate customer service<br>numbers, and social media links. For example, comparing real sites like<br>\u201cpaypal.com\u201d, \u201capple.com\u201d, and \u201camazon.com\u201d with fake variations like \u201cpay-<br>pal.com\u201d, \u201capple-support.net\u201d, or \u201camaz0n-help.com\u201d shows us that real sites use<br>secure HTTPs protocols, professional layouts, and verified credentials, which fake<br>sites often lack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 7<\/h2>\n\n\n\n<p>Image 1:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"542\" height=\"360\" src=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image.png\" alt=\"\" class=\"wp-image-319\" style=\"width:315px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image.png 542w, https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-300x199.png 300w, https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-452x300.png 452w\" sizes=\"(max-width: 542px) 100vw, 542px\" \/><\/figure>\n\n\n\n<p><br>This meme addresses the issue of phishing and how curiosity or overconfidence can<br>lead to security breaches. Many cyberattacks exploit human psychology, such as a<br>desire for free things, by tricking users into clicking malicious links to steal their personal<br>information.<br>Image 2:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"233\" src=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-1.png\" alt=\"\" class=\"wp-image-320\" srcset=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-1.png 364w, https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-1-300x192.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/><\/figure>\n\n\n\n<p><br>This meme hints at the reality that in collaborative work environments, employees can<br>sometimes unintentionally share sensitive information due to relaxed security protocols,<br>such as leaving documents open or sharing credentials using insecure methods.<br>Image 3:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"287\" height=\"431\" src=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-2.png\" alt=\"\" class=\"wp-image-321\" srcset=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-2.png 287w, https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-content\/uploads\/sites\/34185\/2024\/12\/image-2-200x300.png 200w\" sizes=\"(max-width: 287px) 100vw, 287px\" \/><\/figure>\n\n\n\n<p>This shows the constant threat posed by mobile malware and how many people don\u2019t<br>realize that the apps they download could be malicious. It also hints at notification<br>fatigue, where users might ignore important security alerts due to the overwhelming<br>number of notifications they receive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 8<\/h2>\n\n\n\n<p>Movies and TV shows often dramatize hacking, making it seem like it happens in an<br>instant and filling the scenes with flashy visuals. Hackers are usually depicted as<br>geniuses who can break into any system within a matter of seconds, often by simply<br>typing a bunch of random keys on a keyboard. This is very different from the reality of<br>cybersecurity, where hacking involves a lot of time, patience, and complex strategies to<br>be able to crack into some systems. It creates false expectations about the ease of<br>hacking, which can lead to people misunderstanding real world security threats and<br>challenges. The media\u2019s focus on making it cool, shifts attention from important topics<br>like ethical hacking and privacy concerns, giving a warped perspective to many people,<br>on the cyber industry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 9<\/h2>\n\n\n\n<p>After watching the video, I was pretty surprised by how easily people can overshare on<br>social media, just like \u201cDave.\u201d After scoring a three on the Social Media Disorder scale I<br>started thinking about my own habits and how much time I truly spend online. The<br>scale\u2019s items really show how attached we, as people of the modern age, can get to<br>social media. I see this when I find myself constantly checking my phone. I think<br>different patterns across the world happen because of culture and technology. In some<br>places, people rely on social media to stay connected. In other areas, people might<br>focus more on face-to-face connections and avoid sharing personal info online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 10<\/h2>\n\n\n\n<p>After reading the article It really showed all of the different sides of cybersecurity. It\u2019s not<br>just about protecting networks and keeping out hackers social cybersecurity is all about<br>dealing with misinformation and fake news that can mess with how people think and<br>even impact national security. The article talks about how these &#8220;social cyber attacks&#8221;<br>can use things like social media to shift public opinion, which can be pretty dangerous<br>when it&#8217;s on a bigger scale. What stood out to me is how this takes cybersecurity<br>beyond the technical aspect. It\u2019s not just about trying to stop hacking attacks. It\u2019s also<br>about understanding people and stopping the spread of lies online. You\u2019ve got to know<br>some psychology and understand how people trust info to really defend against these<br>attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 11<\/h2>\n\n\n\n<p>The presentation on cybersecurity analysts covers a lot of social stuff like teamwork,<br>trust, and communication. Analysts really have to connect with people across different<br>departments, making sure everyone knows the importance of security policies. They<br>also use these connections to teach teams about possible threats and to get feedback<br>on anything suspicious. It\u2019s not just a 9 to 5 either analysts sometimes have to jump in<br>after hours or during emergencies, building that trust within the organization. In short,<br>the role combines tech skills with understanding people, aiming to keep everyone safe<br>by working together and keeping communication open.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 12<\/h2>\n\n\n\n<p>So, let\u2019s dig into how some of these theories tie into the breach notification. Starting with<br>rational choice theory it\u2019s kind of like how the company and the customers are making<br>moves to protect themselves. The company puts out advice so people can keep an eye<br>on their accounts. And then, there\u2019s Keynesian economic theory, which is all about<br>stepping in and taking action. The company doesn\u2019t just sit there they bring in<br>cybersecurity pros and law enforcement, which is super Keynesian in managing a crisis.<br>For the social science theories I think, risk society theory fits because cyber threats are<br>just part of life now. This notification is the company\u2019s way of dealing with that reality.<br>Then, we have trust theory, which is all about how the company\u2019s trying to regain<br>customer confidence by being upfront. They\u2019re saying, \u201cHey, we\u2019ve got you,\u201d and<br>offering real solutions to build that trust back up.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 13<\/h2>\n\n\n\n<p>The journal study looks at how bug bounty programs work and whether they help<br>companies improve security. It shows and mentions that these programs are cheap and<br>can still be useful, even if companies don\u2019t pay the researchers a lot, because the<br>researchers care about more than just money. The study also finds that a company\u2019s<br>size or brand doesn\u2019t really change how many bugs are reported. However, companies<br>in industries like finance, retail, and healthcare get fewer reports, though it\u2019s not a huge<br>difference. Finally, older programs tend to get fewer reports, but if companies add more<br>code to these old program, it might add to the amount of bugs found within the program.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 14<\/h2>\n\n\n\n<p>Some of the most serious online violations Slynchuk talks about include using unofficial<br>streaming sites and torrenting. These might seem harmless, but they actually break<br>copyright laws and could get you into a lot of trouble, like being sued. Sharing<br>someone\u2019s private information, like their address or photos, is also a big deal because it<br>could lead to problems like stalking or even identity theft. Cyberbullying and trolling are<br>really harmful too since they can hurt people emotionally and even lead to criminal<br>charges. Finally, searching illegal terms online can get you flagged by authorities, which<br>is definitely not worth the risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entry 15<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Digital forensics investigator Davin Teo gave a TEDx talk explaining his work and how he got<br>into the field. He starts by saying forensics isn&#8217;t like the TV shows, it\u2019s not fast or easy.<br>Digital forensics involves collecting, analyzing, and preserving electronic data for court<br>cases. It\u2019s about finding and securing information, like deleted files, and maintaining its<br>integrity. Davin didn\u2019t plan to work in digital forensics. He started as an accountant but got<br>into IT and eventually joined a forensic team at a big accounting firm. He was drawn to the<br>mix of tech and investigation, and it became his career. Over the years, technology has<br>evolved, from floppy disks to terabyte hard drives, making his job faster but still detail<br>oriented. His story shows how skills from different areas, like accounting and IT, can come<br>together in unexpected ways, which connects to social sciences by blending human<br>behavior, technology, and law.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry 1 After reviewing the NICE Framework, I have concluded that I would enjoying focusing on the \u201cProtect and Defense\u201d aspect of the Framework simply because being able to maintain the integrity of a companies\u2019 network and data is something that aligns with my goals as far as professions go. This area of work&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":27482,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages\/302"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/users\/27482"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages\/302\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages\/302\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/media?parent=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}