{"id":110,"date":"2025-02-06T21:28:35","date_gmt":"2025-02-06T21:28:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=110"},"modified":"2025-04-30T03:12:44","modified_gmt":"2025-04-30T03:12:44","slug":"resume","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasondaamash\/resume\/","title":{"rendered":"Journal Entry"},"content":{"rendered":"<p>The NICE Workforce Framework provides a amazing way to explore cybersecurity careers and match them with personal interests. I\u2019m especially drawn to Systems Security Analysis and Technology Research and Development because they focus on identifying vulnerabilities and exploring cutting-edge solutions to enhance cybersecurity. These areas excite me because they\u2019re fast-paced, require creative problem-solving, and allow me to stay ahead of new threats. On the other hand, Database Administration doesn\u2019t appeal as much to me. While it\u2019s vital for securing data, it feels more routine and less engaging compared to roles that involve innovation and analysis. I appreciate how the NICE Framework helps break down the options, making it easier to see where my passion and skills fit best.<\/p>\n<h2 class=\"wp-block-heading has-luminous-vivid-orange-to-vivid-red-gradient-background has-background has-large-font-size\"><em>Entry 2<\/em><\/h2>\n<p>Entry 2- I believe when protecting systems from cyber threats, we draw on principles that have been tested in science. Empiricism reminds us to rely on data and real-world evidence, ensuring our decisions are based on facts rather than assumptions. Determinism helps design predictable systems, enabling the development of consistent security measures. Parsimony encourages simplicity, urging us to avoid unnecessary complexity that could introduce vulnerabilities or errors. Objectivity ensures that our assessments are unbiased and based on facts, allowing for clearer evaluations of risk. By applying these principles in cybersecurity, we can strengthen defenses, adapt to new challenges, and maintain resilience. This approach helps us stay one step ahead in an ever-changing and unpredictable cyber landscape.<\/p>\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-to-vivid-purple-gradient-background has-background has-large-font-size\"><em>Entry 3<\/em><\/h2>\n<p>I believe with cyber threats on the rise, understanding data breaches is more important than ever. Websites like PrivacyRights.org provide researchers with valuable information to analyze breach trends, uncover vulnerabilities, and assess the overall impact on businesses and consumers. By examining the types of breaches, affected industries, and the number of compromised records, researchers can identify patterns that help improve cybersecurity strategies. This data also aids policymakers in crafting stronger regulations to protect sensitive information. Additionally, studying breaches allows researchers to explore how they influence consumer trust and corporate security policies. With this knowledge, organizations and individuals can take proactive steps to strengthen data protection and minimize future risks. For instance, the 2017 Equifax data breach compromised the personal information of approximately 143 million Americans, including Social Security numbers, birth dates, and addresses. This incident underscores the critical need for robust cybersecurity measures and provides a case study for analyzing the consequences of inadequate data protection.<\/p>\n<h2 class=\"wp-block-heading has-white-color has-blush-bordeaux-gradient-background has-text-color has-background has-link-color has-large-font-size wp-elements-54f07b8976d2e5bb9a6ded7e7194bf5b\"><em>Entry 4 \u2013<\/em><\/h2>\n<p class=\"has-medium-font-size\">From Maslow\u2019s perspective of the Hierarchy of Needs, it connects to cybersecurity in various ways. Physiological needs include reliable internet access along with secure cloud storage to facilitate online banking or remote work. Safety needs are met through firewalls, VPNs, and encrypted messaging which is kept super resilient against cyber threats to protect sensitive information. Human love and belonging are promoted through secured interactions on social media, and also private messaging ensures safe communication with friends or family members. Esteem needs are met through successfully identifying and preventing cyber threats, killing a phishing attempt, bolstering one\u2019s confidence, and enhancing professional credibility. Self-realization is achieved through creating awareness of cybersecurity, such as teaching others about online safety or developing security measures that protect the digital sphere.<\/p>\n<h2 class=\"wp-block-heading has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-link-color has-large-font-size wp-elements-a97eaee7a9b482c69f015a927d151135\"><em>Entry 5-<\/em><\/h2>\n<p>The most common motive of cybercrime is money, where hackers, fraudsters, and ransomware victims use computer systems for financial gain. Political motives come next in line, with hacktivists, cyber attacks to promote ideologies in cyber invasions, and disruptions of governments. Revenge stands out as another major motive for target on others using cybercrimes, such as in the case of revenge porn. Some hackers are intent on recognition characterized by notoriety or respect within the online communities. Some have multiple motives, stacked one on the other, blending financial, political, or personal reasons. Examples of entertainment-driven cybercrime would include data scraping just for fun, which, though not justifiable, are still harmful. Boredom stands out as the least justifiable form of motivation, as a result of boredom, mainly cyberbullying, online harassment, or other destructive actions ensue. Every single cybercrime has negative impacts, however, financial, political, and personal motives predominate in their frequency, and they readily attract common understanding, unlike the indispensable aspects found in entertainment or idiocy.<\/p>\n<p class=\"has-white-color has-pale-cyan-blue-background-color has-text-color has-background has-link-color has-large-font-size wp-elements-c31db8e050043e062c2bb99b3c7117b3\"><em>Entry 6-<\/em><\/p>\n<p><strong>Comparison of fake vs real websites<\/strong><\/p>\n<h4 class=\"wp-block-heading\">3 Fake Websites:<\/h4>\n<ol start=\"1\">\n<li>example-fakebank.comBackground: Mimics a well-known bank to steal login credentials and personal data.Indicators of Fraudulence:\u00a0Unusual URL: Slight alterations (e.g., hyphens, different top-level domains).Poor grammar and design: Spelling errors and unprofessional layout.<\/li>\n<li>cheap-medicines-online.com\u00a0Background: Poses as an online pharmacy offering prescription drugs at extremely low prices.\u00a0Indicators of Fraudulence:\u00a0Absence of regulatory seals: Lacks proper certifications from recognized health organizations.\u00a0Unsecured website: Uses HTTP instead of HTTPS, indicating weak security.<\/li>\n<li>win-a-luxury-vacation.comBackground: Promises extravagant vacation giveaways in exchange for personal details.\u00a0 Indicators of Fraudulence:\u00a0Vague terms and unclear deadlines: No transparent rules for participation. Overexaggerated claims: Unrealistic offers designed to lure users into sharing data.<\/li>\n<\/ol>\n<h4 class=\"wp-block-heading\">3 Real Websites:<\/h4>\n<ol start=\"1\">\n<li>truist.com (Legitimate banking website)\u00a0Secure URL (HTTPS) with a padlock icon.\u00a0\u00a0Professional design and branding.<\/li>\n<li>\u00a0roblox.com (Authentic gaming platform)\u00a0Consistent branding and user-friendly navigation.\u00a0 Official contact details and policies.<\/li>\n<li>fortnite.com (Verified game website)\u00a0Clear terms of service and privacy policies.\u00a0 Uses HTTPS for secure transactions.<\/li>\n<\/ol>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<th>Feature<\/th>\n<th>Fake Website<\/th>\n<th>Real Website<\/th>\n<\/tr>\n<tr>\n<td>URL<\/td>\n<td>Slightly altered, suspicious, has fake letters<\/td>\n<td>Clear, matches the official brand<\/td>\n<\/tr>\n<tr>\n<td>Security<\/td>\n<td>Generally HTTP, lacks SSL encryption<\/td>\n<td>HTTPS, secure connection<\/td>\n<\/tr>\n<tr>\n<td>Design and Usability<\/td>\n<td>Poor design, inconsistent layout<\/td>\n<td>Professional design, user-friendly<\/td>\n<\/tr>\n<tr>\n<td>Regulatory Compliance<\/td>\n<td>No legitimate seals\/approvals<\/td>\n<td>Displays relevant certifications<\/td>\n<\/tr>\n<tr>\n<td>Information Transparency<\/td>\n<td>Vague terms, lack of contact info<\/td>\n<td>Clear contact details, transparent<\/td>\n<\/tr>\n<tr>\n<td>Claims<\/td>\n<td>Too good to be true<\/td>\n<td>Realistic and verifiable offers<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h3 class=\"wp-block-heading\">key differences between fake and real websites<\/h3>\n<p>I believe to detect these fake websites, users can check for the right URL, secure HTTPS connection, and site design and usability. However, trusted sources such as Norton LifeLock, FTC Consumer Information, and CISA provide additional guidance on scams and ways to protect personal information.<\/p>\n<p>Citations:<\/p>\n<ul>\n<li>Norton LifeLock. (n.d.). \u201cHow to Spot a Phishing Website\u201d. Retrieved from\u00a0<a href=\"https:\/\/us.norton.com\/internetsecurity\/how-to-spot-a-phishing-website.html\">Norton<\/a>.<\/li>\n<li>Federal Trade Commission (FTC). (n.d.). \u201cShopping Online\u201d. Retrieved from\u00a0<a href=\"https:\/\/www.consumer.ftc.gov\/topics\/shopping-online\">FTC<\/a>.<\/li>\n<li>Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). \u201cPhishing Campaigns\u201d. Retrieved from\u00a0<a href=\"https:\/\/www.cisa.gov\/\">CISA<\/a>.<\/li>\n<\/ul>\n<p class=\"has-white-color has-luminous-dusk-gradient-background has-text-color has-background has-link-color has-large-font-size wp-elements-634584fdd74653aff7acc8640182b648\"><em>Entry 7-<\/em><\/p>\n<p>A developer such as this person enjoys the freedom of working remotely, soaking in the beautiful<br \/>\nsunset and cityscape whilst typing away on the laptop. They could be working on an urgent<br \/>\nproject, trying to finish the assigned tasks ahead of deadline, or just tap a bit into the flexible<br \/>\nlifestyle that remote work offers. In their engrossed work half-aware of surroundings, they could<br \/>\nbe ignoring the cybersecurity risks of their environment. They might be inadvertently connected<br \/>\nto an unsecured, public WiFi network where their data is most likely exposed to hackers. Their<br \/>\nlogin credentials, emails, and private company information might be at risk because, at this<br \/>\nmoment, there are more pressing priorities other than security.<br \/>\nConnection- Human-centered cybersecurity is about the awareness raised combined with easy-<br \/>\nto-use security tools. One should guide the users to practices such as using VPNs, encryption,<br \/>\nand 2FA. The security in place should be intuitive and embedded into the work environment, so<br \/>\nusers don\u2019t have to choose between convenience and safety.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-332\" src=\"http:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192824014.png\" alt=\"\" width=\"773\" height=\"569\" srcset=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192824014.png 773w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192824014-300x221.png 300w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192824014-768x565.png 768w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192824014-408x300.png 408w\" sizes=\"(max-width: 773px) 100vw, 773px\" \/><\/figure>\n<p>This person is all about writing or debugging code.<br \/>\nThey tend to concentrate very hard on getting things right: improving security measures to fix<br \/>\nsome vulnerabilities or to ease efficient functionality of the system. Yet sometimes, prolonged<br \/>\noverconcentration can practically lead to the wrong turn when there is no sustained propagation<br \/>\nof security best practices.<br \/>\nConnection- In the area of human-centered cybersecurity, secure programming is a core<br \/>\nprinciple. Developers must have security in mind from the conception point, ensuring that they<br \/>\nbuild systems to safeguard users against threats such as SQL injection, cross-site scripting, and<br \/>\nother forms of cyber risks.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-333\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192923038.png\" alt=\"\" width=\"776\" height=\"516\" srcset=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192923038.png 776w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192923038-300x199.png 300w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192923038-768x511.png 768w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_192923038-451x300.png 451w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><\/figure>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-334\" src=\"http:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_193107668.png\" alt=\"\" width=\"752\" height=\"375\" srcset=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_193107668.png 752w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_193107668-300x150.png 300w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_193107668-600x300.png 600w\" sizes=\"(max-width: 752px) 100vw, 752px\" \/><\/figure>\n<p>This meme is about forgetting or not knowing the password.<br \/>\nEach time, trying to remember yet another, this time, a more complex password becomes an<br \/>\nordeal, most of the time resulting in insecure practices such as password reuse or writing the<br \/>\npasswords down. Human-centered cybersecurity looks at various designs of security practices<br \/>\nand systems that are intended to cater to human behavior, such as the use of passphrases or<br \/>\npassword managers and even multi factor authentication, to increase security without creating a<br \/>\nburden on the users.<\/p>\n<h2 class=\"wp-block-heading has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background has-background has-large-font-size\"><em>Entry 8-\u00a0<a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\">https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk<\/a><\/em><\/h2>\n<p>In this video the way the media has covered cybersecurity shapes how we think about it. While news stories about major data breaches and cybercriminals create urgency, they often focus on the extremes rather than the common threats. This can lead people to view cybersecurity threats as problems for others, not personal to them. Although attention-grabbing reporting is engaging, it may sometimes cloud more valuable content about protecting personal information. Conversely, the public can be empowered to practice safer use of technology when journalists provide factual and informative content. When it comes to confronting cyberthreats, it is important to have an informed public, and responsible media engagements afford that opportunity.<\/p>\n<h2 class=\"wp-block-heading has-white-color has-light-green-cyan-to-vivid-green-cyan-gradient-background has-text-color has-background has-link-color has-large-font-size wp-elements-6665cbc11bde7f24c3c24deb7c3f21e9\"><em>Entry 9-\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw\">https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw<\/a><\/em><\/h2>\n<p>The scale helps examines a range of issues, which include, but are not limited to, preoccupation, withdrawal, deception, and social conflicts associated with risky overuse. Social media use can manifest qualitatively and quantitatively in different ways in various parts of the world because of cultural norms, accessibility of internet services, economic dependency on these services, and government laws and regulations. Some cultures promote social interaction, others promote face-to-face engagement.<\/p>\n<p>I believe cybercriminals can take advantage of social media activity in many ways, including, but not limited to, phishing attacks, identity theft, social engineering and doxxing. The more personal information that is shared online, the more vulnerable someone may be to scams, fraud or harassment. I also believe that thinking about these issues can help people understand this context and critically reflect on their social media use and enhance their digital well-being and safety and security.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-335\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_194138145.png\" alt=\"\" width=\"771\" height=\"458\" srcset=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_194138145.png 771w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_194138145-300x178.png 300w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_194138145-768x456.png 768w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_194138145-505x300.png 505w\" sizes=\"(max-width: 771px) 100vw, 771px\" \/><\/figure>\n<h2 class=\"wp-block-heading has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-elements-8e40484885a2b574c99b8adde7cd777c\"><em>Entry 10-\u00a0<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b<\/a><\/em><\/h2>\n<p>Beskow and Carley in Social Cybersecurity point to a vital link between societal behavior and cybersecurity, arguing that technical defenses alone will not do against the contemporary onslaughts. Control of such threats requires the merger of insights from social science with technical approaches, so work against problems like misinformation and influence campaigns can be accomplished.\u00a0 The article pertinently makes the case that adversaries manipulate social structure and psychological vulnerabilities to sway public opinion and destabilize societies. Hence, understanding and mitigating such threats require an interdisciplinary approach that takes into account computational modeling, behavioral analysis, and policy interventions. An especially relevant point is the disproportionate effects of exploitation through cyberspace on already marginalized communities. This is also pertinent within wider conversations about systemic deprivation regarding access to information and education in digital literacy, indicating that inclusive strategies in cybersecurity are essential for addressing these inequalities.\u00a0 Authors using data-driven techniques such as network analysis and machine learning for threat pattern detection stress the importance of combining technological tools with knowledge of human behavior to better identify and counter cyber threats.<\/p>\n<p>Beskow and Carley also suggest encouraging collaboration among social scientists, cybersecurity practitioners, and legislators to develop proactive measures; public education initiatives are also emphasized to help users develop their critical thinking and digital resilience. Overall, Social Cybersecurity is an insightful and topical article that argues for the urgent need for a comprehensive understanding of cybersecurity by examining the complex interactions between social dynamics and digital vulnerabilities. In order to continuously reduce the risks associated with social threats to cyber security, interdisciplinary research and public awareness are essential.<\/p>\n<h2 class=\"wp-block-heading has-black-color has-pale-ocean-gradient-background has-text-color has-background has-link-color wp-elements-66956d9e7e72ff4b7cf05b6f2b3d6f2b\"><em>Entry 11-\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0<\/a><\/em><\/h2>\n<p>I believe that cybersecurity has a significant impact on how social and economic opportunities are shaped in the connected world of today. The presentation focuses on issues like workforce accessibility, digital inequality, and the moral ramifications of cyberthreats. It emphasizes how the increasing need for cybersecurity experts brings with it both opportunities and difficulties, especially for underrepresented groups who might encounter entry barriers because of financial and educational limitations. The conversation also considers the wider social duty to preserve digital security, since cyberthreats impact not just big businesses but also people in their daily lives. A social divide is also revealed by the emphasis on certifications and ongoing education, where those with resources can progress in their careers while others may find it difficult to keep up. In the end, the presentation shows how cybersecurity is a social issue that affects digital ethics, personal safety, and economic mobility in addition to being a technical one.<\/p>\n<h2 class=\"wp-block-heading has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\"><em>Entry 12-\u00a0<a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<\/a><\/em><\/h2>\n<p>I believe that the recent data breach shows some important stuff from economics and psychology. On the economic side, it\u2019s a case of information asymmetry. The company and its platform provider knew about the breach long before they told customers, which left people unable to protect themselves in time. Customers also face negative effects, like dealing with fraud risks and spending time replacing cards, even though they didn\u2019t cause the breach. From a psychological angle, prospect theory helps explain why customers might freak out over the potential loss of their personal and financial data. People usually react more to losses than they do to gains. Trust theory is also a big deal here and when breaches happen and communication is slow, it can really hurt a customer\u2019s trust in a brand. Overall, this situation really highlights the need for clear, timely communication and good data protection.<\/p>\n<h2 class=\"wp-block-heading has-blush-light-purple-gradient-background has-background\"><em>Entry 13-<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a><\/em><\/h2>\n<p>I believe digital threats becoming a bigger worry for our national systems, makes it crucial to understand how people feel about cybersecurity policies. The article Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies looks into how different cyberattack scenarios affect public support for government measures to keep us safe online.<\/p>\n<p>The review of past research lays a solid groundwork, pulling from political psychology and security studies. It points out that people\u2019s support for security policies isn\u2019t just about the threats themselves, but how those threats are framed especially regarding how serious they are and the risk they pose. The study compiles previous research and identifies a lack of understanding about how people react to cyber threats compared to more traditional forms of violence. When discussing their findings, the authors share that how we perceive threats plays a big role in shaping our views on policies. When it came to non-lethal attacks, people tended to favor more balanced oversight and less intense regulations. This difference in reactions to lethal versus non-lethal threats is really interesting. It indicates that support for tough cyber policies isn\u2019t uniform and can change based on how the threat is presented emotionally and psychologically. This has important implications for how policymakers talk about cyber threats and explain new rules. The study provides solid insights into how our perceptions of threats relate to our support for policies in today\u2019s digital world. It raises important questions about finding the right balance between security and freedom, and how the way cyber incidents are described can influence public opinion.<\/p>\n<h2 class=\"wp-block-heading has-white-color has-vivid-red-background-color has-text-color has-background has-link-color wp-elements-7acb643b2173859bafd57e47c3d56dac\"><em>Entry 14-<\/em><\/h2>\n<p>I believe that Andriy Slynchuk pointed out that a significant number of internet users unwittingly engage in illegal activities, despite the serious consequences they can have. Collecting personal information about children is a violation of child protection laws and can lead to potential abuse. Another major concern is the impersonation of others on the internet, which is frequently used to defraud or scam people, causing harm to victims both financially and emotionally. If you are not willing to share someone\u2019s personal information or photos, it can result in harassment or identity theft. In addition, unlawful searches such as investigating crime can draw the public\u2019s attention and expose individuals to legal risks. In certain jurisdictions, recording VoIP calls without the other person\u2019s consent may be considered a violation of wiretapping laws. The actions listed are not only against the law but also pose a threat to people\u2019s safety, trust, and privacy, making them particularly grave cyber attacks.<\/p>\n<h2 class=\"wp-block-heading has-pale-ocean-gradient-background has-background\"><em>Entry 15-\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\">https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew<\/a><\/em><\/h2>\n<p>In this video the path to entering digital forensics as described in Davin Teo\u2019s TEDx talk reveals the tight links that digital forensics maintains with the social sciences domain. Openly demonstrating his financial expertise Teo started his work life as an accountant of economic and financial background. His work as an accountant gave him useful insights when he joined digital forensics which proved crucial during financial crime and fraud investigations. \u200b To practice digital forensics successfully a professional needs both advanced technological competence and comprehensive knowledge of human activities alongside social patterns together with ethical standards. The analysis of digital evidence for behavioral interpretation and motive interpretation from Teo matches the methods employed in psychology and sociology studies. The investigations require him to skillfully handle technical components together with understanding human behaviors thus demonstrating the cross-disciplinary nature of his work.\u200b The most exciting aspect of Teo\u2019s career path demonstrates the significance of using different academic perspectives to excel in digital forensics. The example of his career shift shows that forensic investigators need skills from both accounting and social sciences to solve difficult digital crimes. This expanded understanding of digital forensics changed my perspective to view the field beyond technical computing functions because it combines analysis of human behavior beside computer forensics work.\u200b In his experience he demonstrates that professionals seeking digital forensic careers should welcome different educational paths because these diverse backgrounds offer practical methods to study human aspects of digital evidence examination<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NICE Workforce Framework provides a amazing way to explore cybersecurity careers and match them with personal interests. I\u2019m especially drawn to Systems Security Analysis and Technology Research and Development because they focus on identifying vulnerabilities and exploring cutting-edge solutions to enhance cybersecurity. These areas excite me because they\u2019re fast-paced, require creative problem-solving, and allow&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/resume\/\">Read More<\/a><\/div>\n","protected":false},"author":30554,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/110"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/users\/30554"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":374,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/110\/revisions\/374"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}