CYSE 201S C
Journal Entry
JOURNAL ENTRIES
- The following below is the list of articles I ranked from most to least sense.
- 1. “Multiple reasons”
- 2. “Political”
- 3. “Boredom”
- 4. “For money”
- 5. “Recognition”
- 6. “Revenge”
- 7. “Entertainment”
I ranked these seven articles from most sense to least sense. This reason I have “multiple reasons” as first is because it talks about the reason why hackers preform hacks and the socioeconomic factors, technical skill and psychological behind hackers. “Political” was next to being the most sense because of the recent hacktivism wave that has a impact on todays society. Next I chose “Boredom” because of the many internet cases of individuals trying to groom children. This has been a constant issue with the internet being so easy accessible. Next was “For money” because of the realistic statistics and percentage’s on what cyber hacker tend to spend their money on. Next I chose “Recognition” because of the group they spoke about in the article called lizard squad. I remember the attacks they preformed and the article explains the purpose behind these hacks. Next was “Revenge” because of many people want to expose higher ups and their secret business. It is known for hackers to preform hacks to expose sensitive information to embarrass an individual. Lastly was “Entertainment” it’s many cases of hackers hacking without a purpose but personally that makes the least sense to me for the fact being a lot of hackers have a motivation and purpose behind the hacks they do.
___________________________________________________________________________________
After reviewing the NICE workforce framework, the areas that I would feel be a great career choice is Collect and Operate, Operate and Maintain, protect and defend, and securely provision. Those are areas where I could achieve the highest in because of the description of the categories. The least I would want to focus on is Oversee and govern and Investigate because I wouldn’t want to go in the direction of being a detective.
____________________________________________________________
The principle of science relates to cybersecurity because social sciences are just as scientific as natural sciences. These principles can be applied to the study of cybersecurity through a social science framework.
___________________________________________________________
After visiting Privacyright.org, I learned that you could download publicized data breaches. This site is very useful for researchers because the data chronology and the how its designed to help better understand reported breaches in the United States. They also use OpenAI’s GPT-3.5 and GPT-4, powerful language models, to enrich our database with categories and impact information based on the information provided in the breach notification. They also collect data from publicly available, government-maintained data sources. This includes the U.S. Department of Health and Human Services and various state Attorneys General who publish data breach notices they receive under their states’ data breach notification laws.
____________________________________________________________
Maslow’s Hierarchy of Needs relates to my technological experiences by physiological needs when I lose my phone. I do get anxious when I feel for my phone in my pocket and it’s not there. My safety needs are making sure I’m safely browsing the internet and making sure to look out for potential cyber hacks. My love needs are having my family as social media followers so I can see their day-to-day life. My esteem needs are having people like my social media post, it makes me feel good inside. Self-actualization would be creating a platform to connect and advertise products on social media for personal achievements.
____________________________________________________________
Fake websites can always look familiar to a real website, but you must pay attention to detail. I looked at the websites and noticed the URL had spelling mistakes. This can be a key indicator that the site is fake. It had spelling errors that some words were replaced as other characters to try to blend in.
____________________________________________________________
The media influences the understanding of cybersecurity more incorrectly than it is. It has more details that the media skips over rather than doing more research. Watching the video there were a lot of errors seen in the movies and poorly represented a cybersecurity professional.
____________________________________________________________
I scored a 0/9 for the disorder scale and I don’t feel like I need social media to live life. I think the items in the scale are great questions because some individuals suffer from addiction to social media. Social media is something that can be addicting because you can be somebody else online instead of physically.
____________________________________________________________
Social cybersecurity is emerging, and changes are happening. Technology has waived the requirement for physical proximity to influence society. As in the physical domain and the traditional cyber domain, the social-cyber domain offers multiple “forms of maneuver.” Leaders must understand social cybersecurity to defend these internal weaknesses from external manipulation.
__________________________________________________________
Bug bounty programs enable companies to discover and address software vulnerabilities that may otherwise go unnoticed. Existing studies have been hindered by limited data availability and challenges in establishing causality. If these results continue in the future, then companies will continue to derive benefits from bug bounties even as the number of new programs multiplies.
____________________________________________________________
Bullying and trolling can turn into criminal offense charges and jail time. The next serious violation would be using unofficial streaming services that can result in you getting sued. Next would-be identity fraud and using someone’s information without their knowledge. Using other people’s internet networks is illegal because its essentially stealing and this can be dangerous as well. Illegal searches on the web can land you in jail by example of looking up child pornography.
____________________________________________________________
The speaker pathway into digital forensics is very interesting. He mentions there weren’t really any classes that he could take for digital forensics. He had an opportunity to be one the first digital forensics practice in Australia. He had an interest in IT and had experience in accounting.