Cybersecurity and Social Science
Researchers Studying Breaches Journal Entry
Researchers may use information from past security breaches and previous attacks to improve computer software and security to be able to improve computer networks and making them more secure.
NICE Workforce Framework Journal Entry
The area that I would like to focus on as a career would be Threat-Analysis. I would want to put most of my focus on this area because assessing the abilities and capabilities of cyber criminals and foreign intelligence captures my interest.
Principles of Science Journal Entry
The principles of science have lots of relation to cybersecurity. I see science as the understanding of policies of violation which is also included in cybersecurity. With cybersecurity being the practice of using networks to protect computer systems, there is science that goes into all of that. Working with data and important computer files goes hand in hand with the principles of science and working in cybersecurity.
https://learning.oreilly.com/library/view/essential-cybersecurity-science/9781491921050/ch01.html
Maslow’s Hierarchy of Needs Journal Entry
Reviewing Abraham Maslow’s Hierarchy of Needs, I will explain how each level relates to my experiences with technology.
Starting with Self-actualization, achieving one’s full potential, this relates to my technology experiences with me needing a break from social media and even technology all together to have self-management time and to build up more energy to get back out there in the digital world in a sense.
Moving to Esteem needs, the feeling of accomplishment, this relates to my technology experiences with seeing things on social media or even the internet in general that motivates me or just makes me feel good. Even though I’m a person that is not on social media a lot or care how people see me, if I post something and people like it or gain something from it, it boosts my esteem.
Next is Belongingness and love needs, intimate relationships and friends, can be me and my close friends communicating via text or sending each other funny videos on social media. The relationship side of this need can be the same with communicating via text or sending funny videos back and forth on social media.
Next is Safety needs, security and safety, I can relate to this with securing my google chrome browser with security extensions to ensure my computer or and device does not get a virus or attacked.
Finally, we have physiological needs being food, water, warmth, and rest. My physiological needs in terms of technology can be online reading, listening to music, or streaming videos, I also sometimes like to order food from my phone.
Individual Motives Journal Entry
- For Money – Because a lot of motives for hacking now days are for a profit
- Multiple Reasons – There can be different psychological reasons why someone may get into hacking.
- Entertainment – Some get the motive to hack for their own enjoyment or for a “sandbox” feeling
- Political – Politics can influence someone’s motive for hacking
- Boredom –
- Revenge – Revenge can be a common motive behind hacking
- Recognition – Hackers may want to be recognized or noticed for their work
Real and Fake Websites Journal Entry
Fake:
- Look for poor spelling and grammar
- Unreliable contact information
- The address bar can give away clues to a fake website
Real:
- Proper domain extension and URL
- Proper spelling and grammar
- Correct content and information
Module 7 Journal Entry – Cybersecurity Memes
- When you have to type a super long email for work
- When you can’t read the small text
- When you find that nice, quiet, and stable environment and love what you do for work.
- Sitting down editing with a perfect view.
- Understanding and gaining valuable points of a conversation.
- When you get THAT text from THAT person.
- When you randomly get that urge to go through all the photos in your photo gallery.
- POV: Most of your day at work.
- When everyone is ready to go home.
- You want to capture that valuable moment with your phone.
Module 8 Journal Entry – Social Media, Movies, and Hacking
Social media and movies can really distort the understanding of hacking, cybercrime, and cybersecurity to the audience because they typically try to make it more appealing to the audience which may not be the real thing depending on what they are showing. It’s impossible for movies and social media to show what real hacking is like in every aspect because of how hard it is and how long it can actually take to “hack” something. However, movies and social media can get some aspects right but not all.
For example, in the video one of the scenes shows an agent opening a computer in the head office of the agency which there are lots of risks with that. Typically, the computer would be handled in a laboratory environment. Another scene shows a someone trying to hack a register in a compacted room full of people where the hacker in the video explains that yes, the environment and what the hacker is correct compared to real life but the time it takes him to hack the register is unrealistic as he did it in under 5 seconds. In real life it would take way longer.
Module 9 Journal Entry – Social Media Disorder Scale
Social Media Disorder Scale
During the past year, have you …
• regularly found that you can’t think of anything else but the moment that you will be able to use social media again? No
• regularly felt dissatisfied because you wanted to spend more time on social media? No
• often felt bad when you could not use social media? No
• tried to spend less time on social media, but failed? No
• regularly neglected other activities (e.g. hobbies, sport) because you wanted to use social media? No
• regularly had arguments with others because of your social media use? No
• regularly lied to your parents or friends about the amount of time you spend on social media? No
• often used social media to escape from negative feelings? No, if anything it would bring more negative feelings
• had serious conflict with your parents, brother(s) or sister(s) because of your social media use? No
Module 10 Journal Entry – Cybersecurity Analyst
In the presentation/video the individual describes the cybersecurity analyst job as the first line in defense when defending networks against potential threats and attacks. She explains how cybersecurity analysts are usually the first ones to respond to incidents which can be an example of a social theme. She explains how you can basically get a job anywhere since it is in high demand (especially in the government). With cybersecurity and the government tying into each other there are lots of social themes that arise.
Module 11 Journal Entry – Bug Bounty Policies
In the article they discuss how a company hires “hackers” to go into their systems and networks testing their capabilities and their experience. The article discusses how generally two freelance hackers they use to find bugs, one being practical and the other being theoretical. I find it interesting how quick and efficient some of these hackers can find vulnerabilities or bugs within a company’s software. However, not all of them are easy and some hackers spend extended amounts of time trying to find anything. The compensation also goes to the first hacker to find it which makes sense.
Module 12 Journal Entry – Speaking of Mistake of Law
The author in the articles states the top 5 most serious violations are:
- Using Unofficial Streaming Services
- Using Torrent Services
- Using Copyrighted Images
- Sharing Passwords, Addresses, or Photos of Others
- Bullying and Trolling
Using unofficial streaming services could be explained as watching something illegal on a back hand streaming service or watching something that is usually paid for, but instead watching it for free on a secondary streaming service.
Torrents can be used to get copyrighted movies or shows without paying for them which is a violation of course and not good.
Copyrighted images pretty much explains itself because using a image you do not have owners rights to and using it like it is your own work or property is not good as you need to give credit to the original owner of the image.
Sharing passwords, addresses, and photos of others is a big violation as when you give someone else a password that is not yours, you are putting the original holder of the password in a bad position as they could get valuable things stolen from them. Photos of other is a big violation of privacy.
Bullying and Trolling is a big ick of mine. Bullying should not be tolerated anywhere yet is still happens online.