{"id":304,"date":"2025-02-07T00:08:32","date_gmt":"2025-02-07T00:08:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jbran053\/?page_id=304"},"modified":"2025-05-02T02:07:56","modified_gmt":"2025-05-02T02:07:56","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jbran053\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<p>Week 1 Journal Entry &#8211; <\/p>\n\n\n\n<p>When I looked into the Cybersecurity NICE framework, I saw some things I am strong in<br>and some that I lack. With the career I&#8217;m striving to achieve, I want to be stronger in a few things<br>to have a better chance of getting it. The roles that I will be good in are protection and defense.<br>The roles like incident response, Infrastructure support, and Insider threat analysis will be in my<br>better categories because I prefer to work with the defense, and my skills would be perfect there.<br>I would be the least helpful in oversight and governance because of the company&#8217;s management<br>and product, and I would not be a good help in that role.<\/p>\n\n\n\n<p>Week 2 &#8211; Journal Entry 2 &#8211; <\/p>\n\n\n\n<p>Today, I will discuss the different science principles and how they relate to cybersecurity. As we went<br>through the modules, I realized that they all can deal with cybersecurity in their way. Parsimony can<br>relate to cybersecurity because it can simplify how humans approach cybersecurity attacks and create a<br>theory from it. Empiricism related to cybersecurity is that we can study previous attacks and then use the<br>experience in our next defense when another attack emerges. Determinism can relate to cybersecurity,<br>which is when we figure out the cause of the behavior or attack and determine our following action<br>toward it.<\/p>\n\n\n\n<p>Week 3 &#8211; Journal Entry 3 &#8211; <\/p>\n\n\n\n<p>While going through these websites and looking under the headings, I found out they can use<br>this information about data breaches to study the findings and when the breach happened or<br>was born. There are also many different reports up here from many different breach attacks,<br>and you can find a pattern or a way the breaches are coming from to have a precautionary<br>measure or be proactive about the situation. Researchers can also use this information to study<br>the effects or impacts of the breach on organizations, companies, and individuals. Overall, this<br>can help keep information safe when a breach happens or when our security is at risk of getting<br>broken from the inside or out.<\/p>\n\n\n\n<p>Week 4 &#8211; Journal Entry 4 &#8211; <\/p>\n\n\n\n<p>While reading Maslow\u2019s hierarchy of needs, I was given thoughts on how it can relate to my<br>experience with technology. Self-fulfillment can connect with my level with technology by<br>reminding me of my struggle with using computers and achieving my experience with them.<br>Safety needs with my technology include putting on ad blockers and adding firewalls to my<br>laptop to keep files and information safe. Esteem needs, when it comes to my experience with<br>technology, is when I\u2019m stressed while on the computer, I try to either take a walk or take time<br>away from the computer for Psychological needs.<\/p>\n\n\n\n<p>Week 5 &#8211; Journal Entry 5 <\/p>\n\n\n\n<p>After reading the articles, the most reasonable reason why people commit cyber crimes and for<br>individual reasons is for Money. Everything revolves around money, and the world craves it. The<br>second one is for recognition; if you get enough recognition, you can be much more helpful to<br>other criminals and chip in on the crime they are trying to commit. The third reason is revenge;<br>maybe someone or a company has a grudge against it and wants to start a crime from it. The<br>final reason is entertainment, and nobody commits a crime for entertainment because there is<br>always a motive behind a crime, or it wouldn\u2019t be caused in the first place.<\/p>\n\n\n\n<p>Week 6 &#8211; Journal Entry 6 <\/p>\n\n\n\n<p>After looking and comparing these six websites, I separated these into two categories and using<br>my sources and my knowledge I was able to put them in their correct spots because all of them<br>are real ones and the fake ones have very different features behind them. For example, The<br>real websites have \u201chttps:\/\/\u201d which means Hypertext Transfer Protocol Secure and it makes sure<br>you and the website you connected to is encrypted and secure with privacy, the fake ones do<br>not. The second thing I found was that the domain source name is not really telling us where it&#8217;s<br>going to take us when we click on it like the real ones do, and it&#8217;s important that we look closely<br>at that.<br>Fake websites<br>\u25cf NBCNews.com.com<br>\u25cf LiberalSociety.com<br>\u25cf Channel18News.com<br>Real websites<br>\u25cf https:\/\/www.microsoft.com<br>\u25cf NBC News &#8211; Breaking News &amp; Top Stories &#8211; Latest World, US &amp; Local News |<br>NBC News<br>\u25cf Norfolk News &amp; Weather | Norfolk, VA | WAVY.com<\/p>\n\n\n\n<p>Week 7 Journal Entry 7 <\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"436\" height=\"246\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXfpHhqEidQJf5UuU9eP1EyqTAOEO_BVhUIa-GVrepK78hxOKSjZpZiofesRxalLzLbtfLlQOzu1m0B_C9nV8Lkpkvj3l0jCtgc6lbtd4ccOyc0bTzsrzXWDkpN9dmg33mK8Al1D?key=qyqdf2Te5vLs_WZ-3AKNZXP0\"><\/p>\n\n\n\n<p>This meme is about when you are in a cybersecurity position and you can travel anywhere, but all you do is sit there on your laptop. This relates to cybersecurity because we can be anywhere and still do our jobs, no matter where we are. We can be across the world and still be able to do our jobs.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"452\" height=\"254\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXe066hUgn7b8ile9XnsH8ZLnP7mqu76pDIKi-jqB9WvW9VqE79vM0jZkdm524_Y2wb6Q4ypQESnmIr6gkCUZVyiuqRouytV6MQm3mJt6_PX-gNtWo1ZcDVhz-vDxE-LNlxyRqc8?key=qyqdf2Te5vLs_WZ-3AKNZXP0\"><\/p>\n\n\n\n<p>This is a meme of 2 people looking at a laptop while an attack is happening. This relates to cybersecurity and the principles because we use the principles to not only figure out ways to prevent the attack from happening but we can use the scientific principles to keep these attacks from getting breached.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"439\" height=\"247\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXe5PFrt1KgX6pGLPOFYd9rX-Bd3W-Kx3btRiGMS_v_MxonkqBlp7Q6EpB3InfJPXCMHmvU1_mYREBqOjEObPQ23ZueYLwYRNI_ryXUy1m-RFOF60FqW7K4l6inPnjLZY9Agg4w?key=qyqdf2Te5vLs_WZ-3AKNZXP0\"><\/p>\n\n\n\n<p>This is someone staring at their screen and there is codes up there. I chose this meme because it relates to how cybersecurity people in their positions are up there and sometimes they may be confused with certain codes they do and it may not work in the terminal. Reason why cybersecurity people need to be good at their job<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Week 8 Journal Entry 8 &#8211; <\/p>\n\n\n\n<p>After watching this video it tells me that social media plays a huge role in shaping the way we<br>look at the cyberworld. As we go through different clips of people hacking through, For example,<br>the \u201cOcean 8\u201d uses a spearfishing attack to target individuals to something he is passionate<br>about which was the dog that was on his social media page. Another example of how they use it<br>is the analysis, Lisbeth hangs around people&#8217;s apartment places sees the codes puts them in to<br>get in and find specific hardware, and then uses a Nokia to take information and store it on it.<\/p>\n\n\n\n<p>Week 10 &#8211; Journal Entry 9  <\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"806\" height=\"729\" data-id=\"329\" src=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/05\/Screenshot-2025-05-01-220133.png\" alt=\"\" class=\"wp-image-329\" srcset=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/05\/Screenshot-2025-05-01-220133.png 806w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/05\/Screenshot-2025-05-01-220133-300x271.png 300w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/05\/Screenshot-2025-05-01-220133-768x695.png 768w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/05\/Screenshot-2025-05-01-220133-332x300.png 332w\" sizes=\"(max-width: 806px) 100vw, 806px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>I scored 6\/9 on the test and say that I have a problematic usage of it, but I do say it would be<br>less if I didn&#8217;t have such a procrastination problem. The items and the questions on the board<br>were so very specific, that anybody would a social media problem would feel offended because<br>it&#8217;s something that they cannot control and, we have all pretty much been in the same situation.<br>It&#8217;s different around the world because of the technology usage and how advanced technology<br>can be across the world. It can be different from a place like Japan to a place like Switzerland<br>for example because of the many different things they have in their country.<\/p>\n\n\n\n<p>Week 11 &#8211; Journal Entry 10 &#8211;<\/p>\n\n\n\n<p>After reading the article, talks about cybersecurity within the military. It describes different<br>usages of it and talks about the self-resilience within the defense of the network and security<br>system. In reading it, they talk about examples and different strategies on how to protect<br>sensitive information while having high integrity in the military. A part where they talk about<br>training their soldiers on social awareness within the cyber world and putting in a defense<br>mechanism to keep their security up is a very essential step to have. Finally having partners in<br>the private sectors around the world can also be beneficial because it can help our defense be<br>even better than before.<\/p>\n\n\n\n<p>Week 11 &#8211; Journal Entry 11 &#8211; <\/p>\n\n\n\n<p>After finishing the video I found out that a lot of social behaviors can impact us while having a<br>Cybersecurity Analyst job. Being in the Cybersecurity field not only just comes with technical<br>skills, you need to have social awareness to communicate with your team or co-workers. You<br>often work in teams to develop different strategies against cyber attacks so you can keep your<br>defense up but prevent them from coming through from security breaches. Understanding social<br>and human behaviors is very important because we can have an attack on the team because of<br>our mental weaknesses and social engineering.<\/p>\n\n\n\n<p>Week 12 &#8211; Journal Entry 12 &#8211; <\/p>\n\n\n\n<p>After reading this article and seeing what has happened, I concluded that there are two theories<br>and social sciences that are being used here. The two theories that are being used in this article<br>are Marxian and the Laissez faire economic theory. The Marxian used its power to gain control<br>over the weaker individuals and the Lassiez uses its \u201ceconomy should not interfere\u201d to protect<br>individuals. The two political science they use is with social proof to show that they is being<br>hacked by the website and cant get their information and cyber phishing to get scammed with<br>the fake website.<\/p>\n\n\n\n<p>Week 12 &#8211; Journal Entry 13 &#8211;<\/p>\n\n\n\n<p>After reading this article and seeing what it&#8217;s about, I came up with a short summary of this. This<br>article was about a review on a program called \u201cbug bounty\u201d and it was there to help explore<br>and highlight their findings from their effectiveness and their strengths in helping increase their<br>defense in cybersecurity. There was a certain data that was reducing their vulnerabilities called<br>\u201cHackerOne Data\u201d and it was affecting it while they were trying to collaborate between other<br>organizations and hackers. The programs not only help trying to increase and enhance our<br>cybersecurity defense but also create some sort of structure for the future of cybersecurity.<\/p>\n\n\n\n<p>Week 13 &#8211; Journal Entry 14 &#8211; <\/p>\n\n\n\n<p>After reading the Article, here are five what I think are the most serious violations.<br>\u25cf Collecting Information about People Younger Than 13<br>\u25cf Bullying\/Trolling<br>\u25cf Faking your identity online<br>\u25cf Recording a VoIP Call without consent<br>\u25cf Sharing passwords, addresses, or photos of others<br>I feel like these 5 things are serious offenses because they can lead to serious Jail time.<br>Collecting information about younger people can give a huge jail time, and people will<br>call you an internet pedophile. Bullying\/Trolling can cause kids to have serious<br>depression and might even commit suicide. Faking your ID online can lead to serious<br>consequences and might even affect the way people look at you, even if it&#8217;s a fake.<br>Recording calls can lead to the spreading of false information and gathering, and maybe<br>editing the recording. Sharing personal information on the internet is the number one<br>thing that you should never do because it can be leaked and you dont know who has<br>your information or what they can do with the information.<\/p>\n\n\n\n<p>Week 15 &#8211; Journal Entry 15 &#8211;<\/p>\n\n\n\n<p>After watching this video, I gained insight into what forensic investigators do and an<br>understanding of them. From what I&#8217;ve seen, I notice that it can relate to social science because<br>it can relate to human behavior. We can use it to help analyze the sense of communication,<br>online activities, and transactions that approve on this behavior behind closed doors. Not only<br>must investigators use their technology skills, related to their data recovery, along with the legal<br>framework. It&#8217;s been concluded that a digital forensic investigator is deeply connected with<br>social science, as it involves the combination of technical and social experiences.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 1 Journal Entry &#8211; When I looked into the Cybersecurity NICE framework, I saw some things I am strong inand some that I lack. With the career I&#8217;m striving to achieve, I want to be stronger in a few thingsto have a better chance of getting it. The roles that I will be good&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jbran053\/journal-entries\/\">Read More<\/a><\/div>\n","protected":false},"author":29888,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/users\/29888"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages\/304\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}