Journal Entries

#1 Although there are several cybersecurity tasks included in the NICE Workforce Framework, I would concentrate on the “Protect and Defend” category, particularly Incident Response and Vulnerability Assessment. I like addressing problems quickly and directly, which is in line with real-time cyber threat analysis and management. Since I’m not as interested in coding and building systems from scratch, “secure provision” fields like software development are the least attractive to me. Real-time, dynamic challenges are more appealing to me than long-term, design-focused positions. All things considered, I’m driven to positions where I can actively protect and secure networks, having an instant influence on the fight against cybercrime.

#2 To improve security measures, cybersecurity sticks to fundamental scientific concepts. Empiricism guarantees that observable data, including threat intelligence and forensic analysis, form the foundation of security solutions. Experts are able to anticipate and lessen future attacks since determinism highlights that cyber occurrences follow logical patterns. By minimizing complexity that can lead to vulnerabilities, parsimony promotes straightforward but efficient security solutions. In order to ensure that judgments are founded on facts rather than theory, objectivity is essential in fair danger assessments. Another scientific principle that encourages regular testing of security measures to confirm that they work is reproducibility. Cybersecurity experts may develop a data-driven and organized strategy to safeguarding digital assets by putting these ideas into practice by carefully assessing threats, putting effective defenses in place, and enhancing incident response.

#3 They can determine common vulnerabilities, impacted industries, and the kinds of data compromised by looking at breach reports. This data helps in evaluating the success of regulatory regulations and security measures. To create more effective security measures, researchers can also look at trends in attack techniques like physical theft, insider threats, and hacking. Also, examining the timing of breaches might reveal information about how businesses react and bounce back. In order to lessen future breaches, this data supports studies, legal suggestions, and the creation of cybersecurity best practices.

#4 Our interactions with technology reveal Maslow’s Hierarchy of Needs. At the physiological level, essentials like communication are guaranteed by having a functional gadget and internet connectivity. Security mechanisms like firewalls and encryption indicate safety. Online forums and social media provide a sense of belonging. Gaining acknowledgment through likes or encouraging comments boosts one’s self-esteem. Last but not least, self-actualization happens when technology facilitates personal development, including picking up new talents or producing content. My encounters with these requirements demonstrate how essential technology is to satisfying both simple and sophisticated human needs.

#5

I’ve ranked the most and least logical reasons for cybercrime as follows:

For Money: The most rational motivation behind cybercrimes such as ransomware, fraud, and data breaches is financial gain.
Revenge: Insider threats and attacks against people or organizations are fueled by personal grievances.
Acknowledgment: In cybercriminal or activist communities, some hackers want for prestige or legitimacy.
Many cybercriminals have a variety of overlapping motivations, including both ideological and financial ones.
Political: State-sponsored attacks and hacktivism further national or ideological objectives.
Entertainment: While hacking can be fun for some, it can also lead to more severe crimes.
Boredom is the least logical motivation because cybercrime involves more risk, skill, and effort than simple boredom.

#6

A fake PayPal website. For instance, scammers have produced fake PayPal login pages that closely resemble the legitimate “paypal.com” with URLs like “paypa1.com” or “paypaysecurity.com.” The real website is https://www.paypal.com  Scammers frequently employ minor typos or character changes in the URL (such as putting “1” in place of “l”).  Reliable websites, such as PayPal, employ HTTPS and have a padlock icon in the URL bar. Low-level certificates or an absence of these security elements are two examples of fake websites. 

A fake website for Apple support. Using URLs like “support-apple.com” or “applehelp.com,” scammers have created fake Apple assistance websites that imitate the legitimate “support.apple.com.” The real website is https://support.apple.com. Real Apple domains are simple and usually consist of the string “apple.com.” Red flags are deviations or extra words in the domain. Unlike real Apple pages, fake websites frequently feature strange design, poor graphics, and grammatical mistakes. 

A fake Netflix login page. For example, using URLs like “netflix.com” or “netflix-login.com,” which closely resemble the real “netflix.com,” cybercriminals have produced phony Netflix login sites. The website is: https://www.netflix.com. Phishing websites frequently contain extra letters or minor URL modifications.

#7

Employee Writing a Sticky Note with a Password
Meme Text: “Security123 is my password, but shhh, don’t tell anyone.”

What Are They Thinking About?

“I’ll just write down this lengthy, complex password because I’ll never remember it.”
“This small note beneath my keyboard won’t be seen by anyone.”
Human-Centered Cybersecurity Connection: Convenience is more important to people than security.
Solution: To lessen dependency on sticky notes, use a password manager.


A suspicious email link is clicked by someone.
The meme text reads, “Wow! An iPad for free? I better click this FAST!
What Are They Thinking About?

It appears to be authentic. Why would they tell lies?
“I don’t want to pass up this fantastic offer.”
Human-Centered Cybersecurity Connection: Phishing attacks are successful when they take advantage of urgency and trust.
Solution: Teach staff members to spot warning signs in emails.

Tape-covered laptop webcam meme text: “Are hackers watching me? FBI man!
What Are They Thinking About?

“I have no faith in my own gadget. It’s possible that someone is spying.
“It’s better to be safe than sorry.”
Human-Centered Cybersecurity Connection: A combination of genuine worries about surveillance and paranoia.
Solution: Promote webcam coverings while educating people about more general security practices.

#10

In “Social Cybersecurity: An Emerging National Security Requirement” they present the idea of social cybersecurity as a crucial area of national security. According to the authors, social cybersecurity is the scientific study of how cyber-mediated changes in human behavior and societal results can be understood and predicted, as well as how to build the cyber-infrastructure required to preserve societal integrity in the face of changing information environments. ​

The article highlights how state and nonstate actors may quickly shape global narratives thanks to current technologies, changing the character of combat in the process. The use of information by enemies to support their narratives and undermine the social bonds of target countries is pointed out as a stand-alone tactic in information warfare.

#11 The video shows how social behaviors are directly linked to the function of a cybersecurity analyst. To effectively communicate security procedures and hazards to a variety of stakeholders within a company, analysts need to be effective communicators. Since many security breaches take advantage of social engineering techniques that prey on psychological weaknesses, it is important to understand human behavior. Additionally, analysts must interact with staff members to promote best practices and address activities that may pose a concern in order to build a culture of security awareness. Without taking into account the social dynamics that affect cybersecurity, technical solutions alone are not enough, as this emphasis on the human element shows.

Leave a Reply

Your email address will not be published. Required fields are marked *