Journals

Journal 1:

Journal 2: The principles of social science consists of 6 terms, Relativism, Objectivity, Parsimony, Skepticism, Ethnical Neutrality, and determinism. The principles of social science is closely similar to Natural sciences. Because of that, we can incorporate it into cybersecurity by creating a social science framework. With this, we can have a clearer picture when it comes to figuring out the severity of what’s going on. For example: if someone hacks into an organization to steal private information. we can use the principles to, identify the issue, the severity of the issue, and how the police should handle the situation. Implementing these principles will ensure the decrease in cyber related crimes in the future.

Journal 3: Researchers will be able to use the information granted by PrivacyRights.org for their own studies. They can figure out what data breaches are, what kind of data breaches, ways to prevent, and ways to stop an ongoing data breach. That way, they can learn how to prevent redacted data from being in the wrong hands. Now data breaches can occur in many forms such as hacking, theft of credit/debit card numbers, lost, discarded or stolen documents/devices, and mishandled sensitive information. continued research into this field will help strengthen our ability to stop these breaches from happening. Or if they were to happen, be prepared to stop it before more damage has been done.

Journal 4: Maslow’s Hierarchy of Needs is a pyramid of human needs consisting of self-actualization, self-esteem, love and belonging, safety and security, and physiological needs. We can put these needs into effect while using our technology we use daily. Let start with self-actualization, there are plenty of software available to us that we can use to be creative or media where you can find people who have similar interests as you. For self-esteem, you’re enjoying a game you’re playing. You’re working on the hardest level of the game; it’s been a couple of hours and still no luck. Then suddenly, you see the level complete screen. For love and belonging, you can always stay connected to the ones you love with a phone, computer, or tablet thanks to video calls. For safety and security, we can use cameras to record whenever something goes wrong, or metal detectors to find unwanted items. For physiological needs, we can uses our phones to order our groceries online and cpap machines to help with sleeping and breathing.

Journal 5:

Journal 6: Spotting fake websites can be very difficult to most people, but with enough practice people can identify the fake websites and avoid them in the future. For the most part, fake websites can be detected based on their URL. For example, a fake website could use an extra letter in the URL like Bankoffamerica.com instead of bankofamerica.com. Another example could be a letter is missing in a URL like Disord.com instead of Discord.com. Last example could be they replaced a letter in a URL like WaImart.com (replaced the L for a capitalized i) instead of Walmart.com. being able to point out these discrepancies will allow the user to be safer on the internet.

Journal 7:

This meme is an example of how Hackers can disguise themselves as something harmless while doing more harm.

Free Wi-Fi can often be unsecured, allowing for hackers to get into your systems

The hand gestor of the man in here looks like he is saying “WHAT” because his devices have been compromised

Journal 8: The media can not only influence our understandings of cybersecurity, but also just influence our understanding of any kind of topics. the media is a powerful tool that everyone uses whether its on your phone, tv, or the big screen. The people behind the media show how they see how whatever content is within a specific subject good or bad. For cybersecurity, it can show how a hacker can get into s system but tend to inaccurately show how fast they can get into a system. Although the media can show information about cybersecurity, there could be a chance of the information to not be all accurate.

Journal 9:  I got a 0 out of 9 for the social media disorder scale. I typically don’t use any social media except for Discord and TikTok. The questions for the disorder scale are exactly what should be asked if some is dealing with addiction with social media. Different Patterns are found across the world because not everyone experiences the same issue as others. People could take this test and only 20% get 3/9, 30% get 9/9, and 50% get 5/9. These patterns are also ever changing as time goes on, meaning there could be inconsistencies in these patterns as time goes on

Journal 10: In this journal, the author talks about social cybersecurity and describes it as an emerging subdomain of national security. It is planned to affect all levels of future warfare. The article states that in today’s technology, there are both state and nonstate actors that manipulate the global marketspace. This is viewed to be a hybrid warfare. A Russian state agency coordinator for international news said that information wars are the main type of war. Information is the key to strengthen your narratives. We need to educate our military forces about this growing threat while also indirectly educate our society. Cybersecurity is needed for the foreseeable future.

Journal 11: Cybersecurity analysts are the first line of defense. They monitor incidence and the network. You can apply for this position anywhere since the rising threat of cybercrimes. Salary is purely depended on where you are stationed at the moment. The way you become a cybersecurity is so new that there are multiple paths to becoming one, for example having a good resume or get a certificate for having some experience in the field. Cybersecurity analyst entry level is expected to grow around 31 percent in the next 10 years. its pay is 95K because it has low competition so it is a way to encourage people to stay in those positions.

Journal 12: economic theories that relate to the sample data breach letter are the Laissez-fare economic theory and the Rational choice theory. The Laissez-fare economic theory suggests that the government shouldn’t intervene in the economy unless people’s private information is leaked out. The Rational choice theory suggests that businesses/individuals make the best possible choice that benefits their interests. Social Science theories that relate to the sample data breach letter are the Parsimony Theory and the Relativism theory. The Parsimony theory suggests that scientists should keep their levels of explanation as simple as physically possible. The Relativism theory suggests that all things are related.

Journal 13: Bug Bounties are a type of compensation for identifying and pinpointing vulnerabilities within a code base. they are a cost-effective way for companies to ensure they are protected. The research used analyzed a large, propriety dataset for leverages instrumental variables that eliminated sources of endogeneity. It also provided empirical support for assertion. They have a pricy elasticity of supplies of between 0.1 and 0.2 indicating that there are largely motivated by a non-pecuniary factor. A company’s brand profile and revenue aren’t an economically significant impact for the number of valid security vulnerabilities report. programs as they get old could receive less valid reports and bugs will become difficult to detect, making the code base easier to be hacked.

Journal 14: The five most serious violations that users may do are Bullying and trolling, faking your identity online, using other people’s internet networks, collecting information about people younger than 13, and illegal searches on the internet. Bullying by itself is bad enough in person and the internet is no different for these bullies. Faking your identity can cause serious damage to the person you are pretending to be, and it can be very hard to recover from that. Using other people’s internet is essentially stealing which is a red flag as it is. Collecting information on children is just creepy and should not be a thing. Searching illegal stuff on the internet is pretty self-explanatory as it has the word illegal in it.

Journal 15: Digital Forensics investigators analyze data to be in use in a court of law. To make that date make sense in a court of law, you’ll have to implement the principles of social science to your work. In the video, the speaker describes how he go into the field of work. He said that people typically either fell into this field or you were put into it. In this case, the speaker had his father to thank for getting himself into this field of work. He had the privilege to work at the first national digital forensic practice in Australia which is a huge accomplishment.