CYSE 201s

Learning objectives for CYSE201S:

  1. Compare how basic psychological, sociological, criminological, political, economic, and legal theories and models explain cybersecurity.
  2. Identify the strengths and weaknesses of those theories in understanding the connections between human behaviors and cybersecurity.
  3. Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.
  4. Identify how professionals in various cybersecurity careers apply these multidisciplinary concepts in their daily routines.
  5. Describe how hypotheses and research questions are formed in studies addressing cybersecurity through a social science lens.
  6. Describe how data are collected, measured, and analyzed in studies addressing cybersecurity through a social science lens.
  7. Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about the topic.
  8. Explain how the application of social science theories, principles, and research strategies have contributed to our understanding of cybersecurity at the societal level.

Journal Entries

Entry 2

prompt: Review the NICE Workforce Framework. Are there certain areas that
you would want to focus your career on? Explain which areas would
appeal the most to you and which would appeal the least

response:  I don’t know why, but learning and trying to identify threats has always been fascinating to me. I would definitely fit into the criteria of “Protect and Defend” and “Analyze”. I also feel like “Collect and Operate” and “investigate” are also areas that I hope to pursue after graduation. The focus of these four research areas is getting data from particular businesses. Like I said, I was always interested in the branch of threat hunting, so these areas will definitely play a role during work. I found every area of cybersecurity amusing, but the one I found least interested in was “Overseen and Government.”.

Entry 3

Prompt: Explain how the principles of science relate to cybersecurity

Response: The principles of science relate to cybersecurity because it help specialists understand why crimes happen, which can potentially help decrease them. The main thing that I took away while reading each principle was that they were all, in a way, related to psychology. Psychology is categorized as a social science because it is the study of human behavior and why acts are committed. The fundamentals of science also assist in ensuring that explanations and questions are succinct and free of bias. These may not seem like much, but they are very helpful to cyber security specialists. Cyber security specialists use psychology to understand why individuals do the things that they do. Keeping information from research findings short and simple helps other cyber security specialists with their tasks. Also, by reducing the number of opinions in research, the work systems aren’t corrupted. When I say “not corrupted,” I mean that no views are formed that could lead to issues in the future. To sum up what I said, the principles of science are related to cybersecurity because they both deal with psychology, which is the study of human behavior.

Entry 4

prompt: Visit PrivacyRights.org to see the types of publicly available information
about data breaches. How might researchers use this information to
study breaches? Enter a paragraph in your journal.

response: Researchers can better understand popular hacking trends by using the information provided on the Privacyrights.org website. You become an expert in anything when you gain familiarity with it. In this instance, researchers can examine trends within the breaches with the aid of the displayed data breaches. We take lessons from our errors. In order to find a solution, researchers search for hacking trends that are popular. To sum up what I’m saying, Privacyrights.org is helpful to researchers because it gives them an insightful look at what hackers find most vulnerable. After finding and doing more research on these vulnerability targets, researchers can find better ways to patch these vulnerabilities.

Entry 5

prompt: Review Maslow’s Hierarchy of Needs and explain how each level relates
to your experiences with technology. Give specific examples of how
your digital experiences relate to each level of need.

response: I think that all humans can agree that, whether we realize it or not, we subconsciously adhere to Maslow’s Hierarchy of Needs. Whether it is related to my technological experience or daily life, we adhere to these procedures. Regarding the first phase, “Physiological needs,” I would state that having access to a computer is necessary for me to succeed in college. In this day and age, I could not make it through college if I was without access to technology. As time goes on, technology is produced more quickly. matter what, I always travel with my phone and laptop. In terms of “safety needs,” I would have to say that having software that secures my data is essential. In order to unlock my MacBook, I have to provide my fingerprint. For my iPhone, I have to use a face ID. These safety procedures make it harder for unauthorized individuals to get access to my devices. I keep up with my friends through my phone even when I am far away from them. My devices have always been there for me when I had to take care of business. 

Entry 6

Prompt: Review the articles linked with each individual motive. Rank the
motives from 1 to 7 as the motives that you think make the most sense
(being 1) to the least sense (being 7). Explain why you rank each
motive the way you rank it.

Response: 1. MULTIPLE REASONS would have to be at number one for my rankings because there are different reason for why individuals get into hacking

2.BOREDOM is ranked at number two because this is the first stage when looking for something fun to do.

3.ENTERTAINMENT would be third because this is the stage where individuals get involved with hacking and are entertained by all the new things they are learning. It is fun to do bad.

4.REVENGE would be placed into fourth place. The reasoning for this is because once an individual has gotten a hang of how to hack, they then target individuals who have hurt them in the past. Revenge takes place but not often.

5.MONEY is put into fifth place because everyone loves money. Revenge is done which could lead to ransomware.

6.POLITICAL is put into sixth place because some hackers find it amusing to involve themselves with governmental involvement.

7. RECOGNITION is put into last place because I doubt any hacker wants to be known for the crimes they’ve committed.

.

Entry 7

prompt: Journal Entry
How can you spot fake websites? Compare three fake websites (don’t
access those sites, of course) to three real websites. What makes the
fake websites fake ?

response: It is not difficult to identify a website that seems unreliable in the modern era. Sometimes we ignore the red flag that is directly in front of us. I think specialists might be able to distinguish between a phony and authentic page, to respond to the journal’s query. When it comes to examining particular things, experts have the equipment and expertise. This is their primary concern at work, so they proceed with extreme caution. I think it would be more difficult for average people to distinguish between the real and the fake. Experts will perform a virus check, examine the functionality and design of the website, and conduct additional investigation into the page.

Entry 8

prompt: Review the following ten photos through a human-centered cybersecurity framework. Create a
meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).
• https://unsplash.com/photos/mfB1B1s4sMc
• https://unsplash.com/photos/gySMaocSdqs
• https://unsplash.com/photos/ICTKcvnXx_8
• https://unsplash.com/photos/Z3ownETsdNQ
• https://unsplash.com/photos/5QgIuuBxKwM
• https://unsplash.com/photos/R6dSBkz32B8
• https://unsplash.com/photos/BXiLSwwvqrY
• https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg
• https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg
• https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg
• Explain how your memes relate to Human-centered cybersecurity.

response:

My meme relates to Human System integration is basically the ability for anyone to function in their system without any problems or bias. The dog is just waiting for the iPad to bark.

Entry 9

prompt: After watching the video, write a journal entry about how you think
the media influences our understanding about cybersecurity

response: The media, for starters, makes cybersecurity seem like fun. They also show how common crimes are in the process. These films, in my opinion, are meant to both amuse us and educate us about the grave hacks that occur on a daily basis. These scenes, in my opinion, also give us viewers an idea of the tools that hackers use to accomplish their objectives. In general, the media shapes our perception of cybersecurity by illustrating potential attack vectors and offering advice on how to avoid them.

Entry 10

prompt:  Complete the Social Media Disorder scale. How did you score?
What do you think about the items in the scale?
Why do you think that different patterns are found across the world?

response: I had a social media disorder score of 6%. Before seeing the items on the scale, I never gave my social media usage any real thought. In my opinion, a lot of people use social media for their personal gain. Some people use social media for entertainment and to get away from reality, while others use it for work and as a source of income. Social media also helps us stay connected with friends and loved ones all around the world. Social media helps us stay up to date with the news, weather, and the latest trends. Social media is used in different parts of the world.

Entry 11

prompt: Read this and write a journal entry summarizing your response to the
article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-
Archives/Mar-Apr-2019/117-Cybersecurity/b/

response: It is the responsibility of cybersecurity experts to come up with fresh answers to these issues as the generations pass and more and more people discover new motivations and methods for hacking. Social cybersecurity offers a fresh perspective on human behavior and, in essence, how their surroundings mold who they are. Social cybersecurity will grow in importance as time goes on as a defense against all types of attacks. To keep up with everything that is happening, technology needs to be updated and on point.

Entry 12

Prompt: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter“ SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

response: I will start out by discussing rational choice theory as an economic theory. In this instance, it appears that credit card details were taken while a transaction was being completed. Rather than immediately identifying the customer, the company chose to postpone the announcement. They felt that it would impede the investigation, so they took this action. The business decided to invest in the malware problem. Keynesian economics theory is the following economic theory. To help with the problem’s solution and to keep an eye on the system in case anything unexpected happens, the company is hiring cybersecurity experts. The general deterrence theory and the conflict perspective theory are the two social science theories I will discuss. According to the deterrence theory, fewer people will be committing these thefts now that we are aware that cybersecurity experts are keeping an eye on the company. When people steal identity information, it is likely because they are unable to obtain a particular item, as demonstrated by conflict perspective theory.

Entry 13

prompt: Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious

response: The five most serious infractions that I selected from the group are “Recording a VoIP call without consent,” “Bullying and Trolling,” “Collecting Information about Children,” “Faking your Identity Online,” and “Illegal Search on the Internet.” Individuals can suffer harm from bullying and trolling. One can never be sure of another person’s struggles. Information about children should not be collected. Children should not be disclosing personal information because you can never be sure of the motivations of others. Online identity fraud is also a serious offense. This could be extremely harmful and harm the reputations of many people. Illegal searches on the internet should be a red flag. What is the reason why one is searching for that specific topic? This should cause immediate notice to higher officials. Recording any phone call should be illegal. It is not fair that you are recording without someone’s consent. That is a violation of privacy and can also cause severe damage to one’s life.

Entry 14
prompt: Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch
this video and think about how the career of digital forensics
investigators relate to the social sciences. Write a journal entry
describing what you think about the speaker’s pathway to his career.

response: Since digital forensics deals with locating and preserving personal data from people that may be useful for an investigation, it is related to social sciences. It is not enough to make assumptions; you also need to gather evidence that will be crucial in securing a conviction. Evidence from a person’s social life, such as their place of employment, is captured in these data collections. The path that the speaker either fell into or was thrust into into becoming a digital forensics expert. I find this idea appealing because, in any case, he was already aware of the duties associated with the position. He worked as an accountant, but he also did digital forensics. Each job somewhat supports the other.

Article 1 Review

Jeffrey Kwame
CYSE 201S
02/07/2024
ARTICLE 1 REVIEW
How the topic relates to the principles of the social sciences
The topic of “Cybercrime and Inheritance Legislation in Iraq: Extension of Perspectives on
Inheritance Legislation within Iraq” touches on various aspects that are deeply connected to the
principles of the social sciences. Social sciences encompass a range of disciplines that study
societies and human behavior, including economics, political science, sociology, law,
anthropology, and psychology. The topic of cybercrime and inheritance legislation in Iraq, and its
extension to include digital assets, engages with fundamental social science principles by
examining how legal adaptations reflect and influence economic conditions, societal values,
cultural practices, political debates, and ethical considerations in the digital age. It offers a rich
field for interdisciplinary research, highlighting the interplay between technology, law, and
society.
The study’s research questions or hypotheses
The study research questions or hypotheses aim to explore the intersection between
traditional inheritance laws and the emerging challenges posed by digital assets and cybercrime.
They seek to understand how the legal system is adapting to new forms of assets and the
implications for asset distribution after death.
The types of research methods used
The type of research method utilized is comparative legal research. Given the relatively new
challenge that cybercrime presents to traditional legal fields like inheritance law, comparative
legal research might be employed. This method involves comparing Iraq’s approach to these
issues with those of other jurisdictions that have possibly developed more advanced legal
mechanisms to cope with the challenges posed by technology to inheritance law. The goal is to
identify best practices, innovative legal solutions, and potentially applicable legal principles that
could be adapted to the Iraqi context.
The types of data and analysis done

Gathering qualitative data from legal professionals, scholars, and individuals affected by
inheritance disputes involving cyber elements. Policy Analysis: Assessing the effectiveness of
current laws in addressing the challenges posed by cybercrime to inheritance processes and
proposing policy recommendations for improvement.
How concepts discussed in class relate to the article:
This article goes over the significance concept we covered in the modules. Legal
systems, governance and the society effect on technology, it dives into how these concepts
intersect within the frameworks of cybersecurity legislation in Iraq, Demonstrating their tangible
impacts and challenges in a specific socio-political context.
How the topic relates to the challenges, concerns, and contributions of marginalized
groups:
Marginalized groups, such as religious and ethnic minorities, LGBTQ+ communities, and
women, often face targeted harassment and violence online. By raising awareness about the
specific challenges they face concerning cybercrime and inheritance, marginalized groups can
educate the broader public. Addressing these concerns not only benefits marginalized
communities but also contributes to the overall social and economic development of the country.
The overall contributions of the studies to society
The overall contributions of studies in these areas are very important. They help in
shaping policies that protect citizens, promote economic development, ensure social justice, and
foster innovation and security in the digital age. Research and analysis in cybercrime and
inheritance legislation can provide insights into the effectiveness of current laws, highlight areas
for improvement, and suggest best practices from other jurisdictions, further benefiting Iraqi
society.
Cybercrime and Inheritance Legislation in Iraq: Extension of Perspectives on
Inheritance…
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/vie
w/188/70

Article 2 Review

Jeffrey Kwame
CYSE 201S
03/18/2024
ARTICLE 2 REVIEW
Cyber Defamation Through the Media: Comparative Study of Indonesia, South Korea and
Malaysia
(1) how the topic relates to the principles of the social sciences
The social sciences often explore how societal norms and cultural values
influence laws and regulations. This study’s examination of cyber defamation laws
across different countries underscores the ways in which societal attitudes towards
honor, reputation, and free speech are embedded within legal frameworks. The variation
in how defamation is defined and prosecuted reflects underlying cultural differences
and societal priorities. The topic of cyber defamation and its comparative study across
countries offers rich insights into how social sciences examine the interplay between
law, society, culture, technology, and ethics
(2) the study’s research questions or hypotheses
What are the key similarities and differences in the legal frameworks addressing
cyber defamation in Indonesia, South Korea, and Malaysia? This question seeks to
understand how each country defines and prosecutes cyber defamation, taking into
account variations in penalties, defenses, and the legal recognition of online behavior as
defamation. These research questions and hypotheses aim to unravel the complex
interplay between law, society, and technology as countries navigate the challenges of
regulating online behavior to protect individuals’ rights and maintain social harmony.
(3) the types of research methods used
The study on cyber defamation laws in Indonesia, South Korea, and Malaysia, as
detailed in the document, appears to employ several research methods to analyze the
comparative legal frameworks, cultural contexts, and implications of these laws. While
the exact methods are not explicitly outlined in the provided excerpts, we can infer the
likely types of research methods used based on the nature and depth of the analysis
presented.

(4) the types of data and analysis done
The primary data include legal texts such as criminal codes, specific laws
addressing cyber defamation, and relevant amendments from Indonesia, South Korea,
and Malaysia. This also encompasses any legal guidelines or interpretations issued by
judicial bodies.
(5) how concepts discussed in class relate to the article
This article goes over the significance concept we covered in module 11. I picked module
eleven because it talks about what economics have to do with cybersecurity. This article explains
why economics mixes in with cyber security. The article “Cyber Defamation Through the Media:
Comparative Study of Indonesia, South Korea and Malaysia” primarily focuses on legal
frameworks and the comparative analysis of cyber defamation laws in three countries.
(5) how the topic relates to the challenges, concerns, and contributions of
marginalized groups
Marginalized groups may face barriers in accessing legal recourse for cyber
defamation due to economic constraints, lack of legal literacy, or distrust in the legal
system. The complexities of digital evidence and the cross-jurisdictional nature of the
internet can exacerbate these challenges. Marginalized groups and their allies often
lead the charge in advocating for legal reforms that better protect against cyber
defamation while respecting free speech. Their contributions highlight the need for laws
that are sensitive to the dynamics of power, discrimination, and vulnerability in the
digital age. By examining how cyber defamation laws in the three countries address or
fail to address the specific risks and needs of marginalized groups, highlighting both the
progress made and the gaps that remain.
(6) the overall contributions of the studies to society.
The study’s contributions to society extend beyond the academic realm,
influencing legal practices, policy development, public awareness, and individual
behaviors in the digital environment. Its insights help pave the way for more inclusive,
equitable, and respectful digital interactions.
Cyber Defamation Through the Media: Comparative Study of Indonesia,
South Korea and Malaysia

https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/199/75

Career Paper

Jeffrey Kwame
CYSE 201S
April 12, 2024
Career Paper
The cybersecurity career that I will be discussing is an ethical hacker. Ethical
hackers, also known as white hat hackers, play a crucial role in cybersecurity by
searching for and addressing vulnerabilities within software systems. As the world
becomes increasingly reliant on technology, the need for these professionals has never
been more critical. Ethical hackers work to safeguard organizations from the
ever-present threat of security breaches, which are becoming more frequent as our
reliance on digital technology grows. These experts perform essential duties that
protect not only the operational integrity of organizations but also the sensitive data
they hold. In an age where digital information is a prime target for theft, ethical hackers
provide an invaluable service by preemptively identifying and mitigating potential
security weaknesses. This ensures that organizations can operate securely, maintaining
both their functionality and the trust of their stakeholders. Every organization,
regardless of size, requires robust cybersecurity measures to protect against the
potential financial and reputational damage caused by data breaches.
Learning and understanding the social science principles are important to
understand why things are happening. Psychology is important because it is the
study of behaviors. Everyone is different and we encounter our struggles. Studies
on behavior help workers get a broader understanding of things. Everyone
handles situations differently. Behavior is just one factor in an individual’s life.
This also ties into the environment one resides in, one social life they are having,
and the economic class level that they are. Learning about other individuals and
the type of environment that they live in helps Ethical hackers think outside the
box. Sometimes we have to widen our knowledge to get further in life. Social
science research is as important for Ethical hackers to obtain because it also
helps them understand and teaches them the factors that came from the
research. Everyone has their motive and reasoning behind what they do.
Understanding these things such as behavior theories are important. The

marginalized group would have to be the organizations that can’t afford to have
ethical hackers working for them.
Ethical hackers get a chance to read about solutions and the work that was put in
to reach those solutions. Cost and benefits play a huge part when working with
ethical hackers. Many organizations don’t have the correct funds to spend on
these types of cybersecurity protection which causes them to become very
vulnerable. Or sometimes these organizations just simply want to spend their
money on these types of performances because it is a lot of money for them, but
in reality, ethical hackers are just there to assure that everything is working
correctly. Ethical hackers are helping organizations stay up and running while
also bringing in more revenue.
Ethical hacking is on the list of the top two careers in cybersecurity that I am
thinking about pursuing once I graduate college or find an internship. Threat
hunter is on the list, they are both similar. The thing about these two is that they
deal with having to think like criminals. I’ve always heard that to catch a criminal,
you must think like one. In this case, ethical hackers are given the information to
help them think like a criminal. Ethical hackers always have to be a step ahead of
the game because like I said earlier in the paragraph our world is becoming more
and more technologically advanced and hackers are finding new ways to hack
systems.

Citation
https://www.synopsys.com/glossary/what-is-ethical-hacking.html
What-is-ethical-hacking
https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-a
nd-why-is-it-important