Journal Entry #15

Reflecting on the video transcript and the career pathway of the digital forensics investigator, it’s evident that their journey intertwines with various aspects of the social sciences. The speaker’s story illustrates the multidisciplinary character of their field by including aspects of criminology, psychology, and sociology. The speaker’s experiences highlight the sociological, psychological, and criminological aspects of digital forensics, from the covert data collection practices that raise concerns about privacy invasion and surveillance within organizational contexts to the involvement in cases of anonymous threats and fraudulent activities that require an understanding of criminal behavior and motivations. Furthermore, the speaker’s shift from accounting to digital forensics emphasizes the value of flexibility and the adaptation needed to succeed in new industries. All things considered, the speaker’s professional path offers as a powerful illustration of how the social sciences and digital forensics interact to improve our comprehension of cybercrime and aid in the creation of successful investigative techniques.

Reference:

Journal Entry #14

Andriy Slynchuk’s breakdown of potential illegal activities on the internet sheds light on several concerning behaviors that internet users might unknowingly engage in. Five of these offenses stand out as being especially serious because of the potential legal repercussions and detrimental effects they may have on people and communities. First off, utilizing torrent services and streaming video from unofficial sources without permission can get people into legal problems since they infringe copyright laws and violate the rights of content providers. Second, disclosing private information without permission—such as addresses or images puts people at risk of identity theft and other online crimes in addition to violating their right to privacy. Thirdly, if trolling or cyberbullying reaches the point of harassment or defamation, it can cause emotional distress to its targets and have legal ramifications. Fourthly, because it goes against people’s expectations of secrecy, recording VoIP communications without permission breaches their right to privacy and may be illegal. Finally, doing unlawful online searches, such as looking for damaging or illicit items, has a high legal risk and may result in criminal penalties. These acts are severe because they violate laws and regulations and have real repercussions for people’s rights, welfare, and the larger societal framework.

References:

https://clario.co/blog/illegal-things-you-do-online/

Journal Entry #13

The article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” published in the Journal of Cybersecurity provides a comprehensive analysis of bug bounty programs, revealing key insights into their functioning and effectiveness. According to the research, there is a relatively inelastic supply of hackers due to non-monetary incentives like reputation and experience acquisition. This is especially beneficial for small and medium-sized firms (SMEs) that have limited resources. The study also reveals that the amount of legitimate vulnerability reports received is mostly unaffected by a company’s income and brand recognition, indicating that bug bounties work well for businesses of all shapes and sizes. There are differences observed between industries, too, with financial, retail, and healthcare firms receiving less complaints than other industries. This might be because exposing vulnerabilities has differing opportunity costs. Additionally, the data suggests that the quantity of new bug bounty programs has no impact on the reports that businesses get, suggesting that sites such as HackerOne are capable of efficiently attracting and retaining hackers. However, bug bounty programs often receive fewer reports as they get older, which emphasizes the significance of changing the incentive schemes over time. Lastly, the paper notes that a significant amount of the variance in program reports is still unaccounted for, indicating the possibility of other factors impacting vulnerability flow that were missed throughout the analysis. All things considered, the paper offers insightful analysis of bug bounty marketplaces and emphasizes the necessity of more study in cybersecurity practice and policy to meet new possibilities and problems.

Journal Entry #12

The data breach notification letter is an example of how many economic and social science theories are applied to understand and handle cybersecurity problems. Supply and demand theory helps to explain why there is a greater need for cybersecurity measures after a breach, which might lead to higher costs and more investment in security solutions. The notion of information asymmetry provides insight into the difficulty of informing consumers about breaches in an efficient manner, as the firm has access to more extensive information about the occurrence than the impacted parties have. The idea of social learning clarifies how consumers could modify their behavior by witnessing the acts of others in their social circles, while the theory of psychological reactance highlights the possibility of resistance to advised actions resulting from the perception of risks to personal freedom. Through the integration of these theories into its response strategy, the organization aims to effectively navigate the complex terrain of cybersecurity incidents while minimizing the impact on impacted individuals and organizational stakeholders. This approach contributes to the development of a more knowledgeable and resilient cybersecurity ecosystem.

Reference:

https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf

Journal Entry #11

Video – https://www.youtube.com/watch?v=iYtmuHbhmS0

The presentation on cybersecurity analysts uncovers some intriguing sociological issues that reflect larger societal trends. In the video, we get a glimpse into how digital security is changing and why it’s becoming increasingly important in today’s world. It’s interesting to see how they explain the basics of the job for entry-level cybersecurity analysts. What caught my attention was how they pointed out that these jobs are often in areas where there’s a high demand, which usually means wealthier neighborhoods. This highlights how your background can affect your job opportunities in cybersecurity. It’s also fascinating to learn about the salary ranges for these positions and what that says about how society values cybersecurity skills. This discussion opens up broader questions about inequality and the importance of protecting our digital systems. Overall, the presentation goes beyond just technical details, showing us how cybersecurity jobs are intertwined with social structures, and giving us a glimpse into the bigger picture of digital security in our society.

Journal Entry #10

The article “Social Cybersecurity: An Emerging National Security Requirement” by Lt. Col. David M. Beskow and Kathleen M. Carley really grabbed my attention and got me thinking. As I read through it, I learned about the changing landscape of national security challenges in today’s digital age. It was fascinating to see how technology is giving both state and non-state actors a lot of power to shape opinions, ideas, and social norms. I found the comparison between social cybersecurity, where people use technology to influence others, and traditional cybersecurity, which focuses on protecting information systems, really interesting. They call this process “cognitive hacking,” and it’s intriguing to see how fields like social sciences, psychology, and marketing are being used to shape society and individual behavior. The article also stressed the importance of taking a multidisciplinary approach, combining disciplines like political science, sociology, and social psychology, to fully understand the dangers of cyber-mediated society. It was clear that action is needed, not just awareness, especially when we’re facing new challenges in information warfare, as shown by the example of the Russian media blitzkrieg and the role of bots in making these dangers worse. Despite the complexity of the issues discussed, the article gave me hope that we can protect our national interests and values in this increasingly digital world by understanding and addressing these challenges head-on.

Journal Entry #9

My score on the Social Media Disorder Scale is zero, which means that I don’t use social media in a major way. I don’t particularly enjoy social media sites, even if I do use them for contact with friends and family. I purposely cut back on my use of Facebook and other comparable websites if I find myself using them for extended periods of time. Instead, I usually use my time to play video games, read internet articles, and watch instructional videos on websites like YouTube. I am aware, though, that using these platforms excessively might occasionally cause distraction, which raises the possibility that I may be classified as a disordered social media user. Given that I see people exhibiting these behaviors to varied degrees, I believe the items on the scale to be credible markers of disordered consumption. Global patterns of social media usage are significantly influenced by cultural variations as well. Social media participation varies throughout cultures, and as we get more networked, these lines may become less clear.

Journal Entry #8

Media hacking scenarios frequently utilize creative graphics to distort reality, portraying hackers as brilliant geniuses who effortlessly maneuver through fast-paced interfaces. These depictions, while amusing, diverge from the real hacking process, which entails thorough investigation and vulnerability-exploiting. While these extras might pique curiosity in the field, they also add to the mystique surrounding cybersecurity. It’s vital that viewers interpret these representations critically and distinguish between cybersecurity fact and entertainment. Although, rather than only depending on overblown images, several media outlets are beginning to portray hacking more accurately and highlight the complexity involved. These depictions provide a more realistic picture of the hacking process by emphasizing the technological know-how, strategy, and research needed. These representations assist in clarifying cybersecurity and inform viewers about the realities of cyber risks by showing hacking in a more realistic manner. This move toward realism is a good thing as it helps people comprehend and become more conscious of cybersecurity risks.

Journal Entry #7

Photo: https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg

  • Caption: “When you’re in a cybersecurity meetin and pretending to understand everything.”
  • Explanation: This meme features a group of people sitting at a table in a meeting room with laptops in front of them. The caption suggests that despite being in a cybersecurity meeting, the people feel lost or out of their depth but is pretending to understand the concepts.

Photo: https://unsplash.com/photos/man-sitting-on-concrete-brick-with-opened-laptop-on-his-lap-Z3ownETsdNQ

  • Caption: “When you’re on the rooftop at sunset…” “But you’re busy patching vulnerabilities to enjoy the view”
  • Explanation: The caption implies that despite being in a serene setting, the person is preoccupied with cybersecurity talks, like patching vulnerabilities, and can’t fully enjoy the view.

Photo: https://unsplash.com/photos/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8

  • Caption: “When you successfully launched an evil twin of the local coffee shop wifi.” “But then you realize you’re the one who accidentally connected to it.”
  • Explanation: The caption suggests that the person successfully launched an “evil twin” Wi-Fi network but then realizes they accidentally connected to it themselves, highlighting the irony of the situation.

 

Journal Entry #6

How to Spot Fake Websites

The main indicators of the fake websites’ lack of authenticity include their absence of essential security features like SSL encryption, missing genuine product details, lack of contact information, unusually low prices, and overall questionable credibility due to the absence of reliable reviews, endorsements, and consistent branding. These aspects sharply contrast with the genuine websites’ robust security measures, accurate product information, extensive customer reviews, and well-established reputations. The following provides examples of fake websites.

  1. http://www.abibas.com
    1. Misspelling the name and lack of HTTPS encryption
    2. Could provide a similar layout to the original adidas.com
  2. http://www.aple.com
    1. Misspelling the name and lack of HTTPS encryption
    2. Could provide a similar layout but miss certain information such as legitimate contacts
  3. http://www.bankofamerica-login.com
    1. incorporates the name of a legitimate bank but with additional words, indicating a phishing attempt.
    2. Appending the name and lack of HTTPS encryption