Journal Entry 1- Review the nice framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
Currently, investigation and defensive roles are of interest for me as these categories involve a more orthodox way of approaching cyber related issues. All aspects of the NICE Framework play an important part in cyber defense but the least appealing area would have to be Operate and Maintain as I would like to be more involved in the “investigation” aspect of cybersecurity.
Journal Entry 2 – Explain how the principles of science relate to cybersecurity.
In the world of cybersecurity, the principles of social sciences fill in the gaps of research done on the factors that contributes to cybersecurity. Cybersecurity is not only technologically based, but also influenced by human behaviors as malicious and criminal activity done within the cyberworld are human based. This poses the question as what the best form of defense against cyber-attacks and criminal activity are done within the cyberworld. Cybersecurity, in general, can benefit from the use of multiple insights from different professions and disciplines.
Journal Entry 3 – Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
The information given on the privacyrights.org provides readers updated data breaches and the trends in which contributes to repeated events. This website also provides current policies implemented to sustain data breaches events and analyze how effective these policies are within time. Researchers and individuals who study information provided can identify trends that arise within the cyberworld which can help create more effective policies. As research continues within cybersecurity, the information provided on this website can aid researchers and policy makers as it provides useful information that can identify gaps in current implemented policies.
Journal Entry 4 – Review Maslow’s hierarchy of needs and explain how each level relates to you experiences with technology. Give specific examples of how your digital experiences relates to each level of need.
Maslow’s hierarchy of needs gives an idea into the theory of human motivation as it breaks down the importance of different needs a person can come across. Technology has grown to the point where the cyberworld can be described as its own world with its own aspects of business, criminology, and social interaction. The need for safety has been the most recent influence for me as ODU’s cybersecurity program has exposed me to the complexity of online safety and cybersecurity. Technology today has also influenced the social needs of an individual as many of my peers, myself included, are more engaged with social media and how it makes it easier to stay connected with each other.
Journal Entry 5 – Review the article linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
- For money
- Multiple reasons
- Revenge
- Political
- Recognition
- Entertainment
- Boredom
In terms of cybercrimes, money is the biggest motives as ransomware attacks and other forms of cyberattacks have a common goal. Revenge would be number three as we can see this as a motive for crimes that have the intent of harming an individual. Although we see political motives behind certain cybercrimes more today, I believe it still doesn’t triumph money being the top motive for committing crimes. Recognition was a more difficult one to rank as this motive usually is paired with other motives. Entertainment and boredom would have to be placed at the bottom of this ranking as these two motives seem to be slightly more rare.
Journal Entry 6 – Can you spot three fake website and compare the three fake websites to three real websites, plus showcase what make the fake websites fake?
One website I was able to find was a fake North Face website that was made to mimic the actual online store. The website was unorganized and contained multiple spelling errors. Another website I was able to find was a site that claimed to be able to give analytic information on your social media page. Further looking into websites claiming to give you insight on who looks at your social media page, many social media platforms have addressed these fake sites/apps stating that there is no way third party apps can access the analytic information on your social media pages. A third website was of a third party organization that are accepting donations to fight global warming. This website is no longer available but upon clicking on the website, Safari/Google gives you a warning of a possible fake website. Feature such as this should be implemented more as it can be difficult for someone to identify a fake website.
Journal Entry 7 – Create a meme explaining what is going on in the individuals’ mind(s). Explain how your memes relate to Human Integration.
This picture shows how technology has advance to where everything from work to social interactions can be done on one device.

Journal Entry 8 – After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. Hacker Rates 12 Hacking Scenes In Movies And TV | how Real Is it? – Youtube
Some of the media in the video are over exaggerate certain scenarios which we can expect because, after all, it is a movie. On the other hand, it is interesting to see the attention to detail some scenes carry.
Journal Entry 9 – Write a journal entry about how you think the media influences our understanding about cybersecurity.
Media coverage on cybersecurity related events usually consists of hackers and scams which does not fully cover the threats and risks of cybersecurity. Currently, we are beginning to see more international cybersecurity news which can raise the awareness of how technology has advanced to the point where cybersecurity now affects all aspects of society, rather it being nothing more than scam attempts. Media coverage of cybersecurity should be more common as spreading knowledge of cybersecurity to individuals who are not well knowledgeable on technology can identify the risks that would lead them becoming a victim of these crimes.
Journal Entry 10 – Complete the social media disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world.
I scored on what would be characterized as average usage of social media. I feel that the items on the scale can be more in-depth on what exactly a person does on social media to identify what habits on social media are addicting.
Certain countries use social media as a business rather than using it for interaction which could be one of the reasons for the different patterns across the world.
Journal Entry 11 – Read this and write a journal entry summarizing your response to the article on social cybersecurity. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/
Social Cybersecurity is the form of security that would best address the issues we see today. Social media can be characterized as its own society as many people around the world can interact through these platforms which call for an effort to address the human to human risk factors of technology. Because of how widely used social media has become, the opportunity for individuals with bad intentions can single out their victim and new research should be done to help lower victimization. The development of this discipline shows how complex technology and the internet is and how more complex it will continue to be as technology continues to grow.
Journal Entry 12 – Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
Cyber analysts is described as the first form of defense. This job monitors and regulates networks and responds to cyber-related incidents. In regards to social behavior, cyber analyst can identify societal risks within the internet and also have an influence on the training and education of technology. Roles, like cyber analysts, highlights the critical thinking, communication, and teamwork skills required in cybersecurity.
Journal Entry 13 – Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf and describe how two different economics theories and two different social sciences theories relate to the letter.
Two economic theories we can relate the letter to could be Rational Choice Theory and Kenesian Theory. For RCT, we can assume that the company will invest in a cybersecurity products to prevent incidents from happening again. For Keynesian theory, Incidents like this can be used as an example for the argument that the government should increase cybersecurity funds.
Journal Entry 14 – Read this article and write a summary reaction to the use of the policies in you journal. Focus primarily on the literature review and the discussion of the findings.
This article highlights the research on the effectiveness of bug bounties. The findings of this research state that bug bounties have little impact on identifying potential security risks which I find surprising, although, the results of this research can help identify gaps in certain cybersecurity measures.
Journal Entry 15 – Andriy Slynchuk has described eleven things internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
- Bullying and Trolling
- Collecting information on children
Cyberbullying has been an ongoing issue that has become more complex with the creation of social media. The intent to harm an individual online is one of the most darkest aspects of the internet that should be addressed more. Collecting information on children is also one of the 11 things that is the most serious as children can easily become victimized on the internet. Along with bullying, collecting information should also be addressed more as children are engaging more with the internet.