CYSE 201S

Journal Entry #1

By Justin White

CYSE 201S

January 17th, 2025

Professor Yalpi

NICE Framework

The NICE framework serves as a valuable resource for gaining insights into various cybersecurity roles. Areas I would like to focus on include cybercrime investigation, data analysis, and cyber intelligence planning, which fall under the “Investigation,” “Implementation and Operation,” and “Cyber Intelligence” categories. These careers are appealing to me because they have the opportunity to work on difficult security concerns, which is what I imagine as a cybersecurity major, and it aligns with my career goals and interests. However, tasks such as program management or program auditing that fall under “Oversight and Governance” do not appeal to me or my understanding of cybersecurity.

Journal Entry #2

By Justin White

CYSE 201S

January 27th, 2025

Professor Yalpi

Principles of Science

Empiricism, determinism, parsimony, and objectivity are all scientific principles that apply to cybersecurity. Empiricism promotes data-driven decision-making, with cybersecurity measures based on seen and tested outcomes to ensure solutions are effective. Determinism means that systems perform reliably under particular conditions, which informs threat modeling and risk assessments in cybersecurity. Parsimony promotes simplicity in solutions, which means that cybersecurity systems should be as simple as possible while retaining security, decreasing complexity, and decreasing vulnerability. Objectivity guarantees that cybersecurity plans are based on unbiased data, which fosters trust and consistency in threat response. These concepts work together to drive the creation of effective, dependable, and scientifically sound cybersecurity strategies.

Journal Entry #3

By Justin White

CYSE 201S

February 6th, 2025

Professor Yalpi

Public Privacy

After visiting PrivacyRights.org and reading its extensive database of publicly available data breach information, including affected firms, breach categories, and exposed data. I believe researchers can use this data to identify trends in cybersecurity vulnerabilities, assess the effectiveness of security solutions, and investigate the impact of regulations such as GDPR from Europe. By investigating breach trends, researchers can acquire a better knowledge of which industries are most vulnerable and how breaches evolve over time. Furthermore, this information can be utilized to create prediction models for risk assessment and to help businesses improve their security practices. Access to real-world breach incidents allows for empirical research that informs policy recommendations and promotes public awareness about data protection.

Journal Entry #4

By JustinWhite

CYSE 201S

February 13th, 2025

Professor Yalpi

Hierarchy Relations

Maslow’s Hierarchy of Needs is directly related to my experiences with technology. At the physiological level, I rely on technology for essential tasks such as online banking, meal ordering, health management via fitness apps, and school. Cybersecurity technologies like  multi-factor authentication help to keep my personal information safe. Social media, online gaming, and virtual meetups let me stay in touch with friends and family, which gives a sense of belonging to me. Furthermore, using websites or apps for a sense of belonging also helps with professional networking like LinkedIn or digital certifications which give me a sense of pride and self-esteem. Lastly, starting coding projects or learning another language through an app enable me to grow and express myself. Every level involves technology, which influences how I communicate, secure my information, and grow.

Journal Entry #5

By Justin White

CYSE 201S

Professor Yalpi

February 20th, 2025

Motives for Cyber Crime

Cybercriminals perform what they do for a variety of reasons which motivate them the most common is financial gain (1). Money is a powerful motivation, especially when cybercrime promises large benefits with minimal risk. Right behind that is recognition (2), as many hackers seek prestige and respect in their communities.  Political motivations (3), such as hacking, are essential, as attackers target governments and corporations for ideological reasons. Personal vendettas result in cyberstalking and doxxing, executing retribution (4) is the next highest priority. When criminals mix financial, ideological, and personal incentives, multiple factors (5) are at play. Entertainment (6) scores lower because hacking for fun typically leads to more serious offenses and tends to be done by those who are younger just testing what they are actually capable of doing. Finally, boredom (7) gets the lowest score, as large-scale cyber crimes require ability, strategy, and a deeper objective beyond simple amusement. While all motivations contribute to cybercrime, financial rewards and recognition have the most impact.

Note* I numbered each reason while keeping it in paragraph form to complete the assignment.

Journal Entry #6

By Justin White

CYSE 201S

Professor Yalpi

February 26th, 2025

Fakes Hidden Everywhere

Fake websites are everywhere, and identifying them is harder than ever. Memcyco cites recent scams such as a false PayPal login (paypa1.com), counterfeit e-commerce companies with absurdly low costs, and bogus airline booking sites that promise fake discounts. These frauds frequently have suspicious URLs, no HTTPS security, and irregularities in design, whereas legitimate websites employ safe payment methods, confirmed contact information, and professional branding. Misspelled names, a lack of security certifications, and ambiguous contact information are all warning signs. If an offer seems too good to be true, it probably is. Staying careful and double-checking website facts might help you avoid becoming a victim of online scam.

Fake websites: 1. paypal.com: this has a lack of Https and minor visual discrepancies. 2. E-commerce: unusual low price products that are hard to believe with requests for direct bank account transfer for payment. 3. Airline booking: exclusive deals that have mandatory booking, no confirmation prompt and altered logo.

Real websites: 1.paypal.com/signin: has https and a padlock symbol. 2. E-commerce: market believable prices and has secure payment services through paypal or credit card. 3.  Airline booking: normal promotions through official avenues with reasonable booking timeframes, confirmation prompts and ticket receipt with booking references, and clear consistent branding.

Work Cited

Lakovics, Z. (2024, September 23). 5 recent examples of fake websites | Memcyco [Video]. Memcyco. https://www.memcyco.com/5-recent-examples-of-fake-websites/



Journal Entry #7

By Justin White

CYSE 201S

Professor Yalpi

March 6th, 2025

Meme #1: 

Caption: “I have VPN! I’m invincible!”

Explanation:  This image emphasizes a widespread misconception: that utilizing a VPN alone ensures perfect security. It connects to human-centered cybersecurity by demonstrating how overconfidence in security tools can lead to unsafe online behavior, underlining the importance of broad cybersecurity understanding beyond simply using a VPN.

Meme #2:

Caption: ” Me: Just checking emails. Also me: Accidentally hacking the Pentagon.” 

Explanation: This plays on the notion of hackers wearing hoodies in dark rooms while simultaneously emphasizing how simple cybersecurity errors can have serious implications. It relates to human-centered cybersecurity by demonstrating how unintentional behaviors, such as opening phishing emails or incorrectly configuring security settings, can result in major security breaches.

Meme #3: 

Caption: “Public Wi-Fi is free, so is my data.”

Explanation: This picture draws attention to the dangers of utilizing unprotected public Wi-Fi, a popular practice that exposes users to cyber attacks. It relates to human-centered cybersecurity by highlighting how convenience frequently trumps security considerations, emphasizing the need for improved user education and safer design choices.


Journal Entry #8

By Justin White

CYSE 201S

Professor Yalpi

March 20th, 2025

The Media’s Impact on Cybersecurity Perceptions

After seeing the video, I acknowledged how much the media influences our perception of cybersecurity, often wrongly. Many movies and television shows exaggerated hacking, making it appear quick and flashy when, in fact, it takes patience, talent, and finesse. The expert in the video explained how certain scenes get basic elements correct but oversimplify the process, causing the public to misinterpret serious cybersecurity concerns. This misrepresentation might instill unwarranted anxieties or even minimize real threats. On the plus side, the media can raise awareness about cybersecurity and promote discussions about digital safety. However, for factual information, users should turn to cybersecurity professionals rather than Hollywood dramatizations. The movie emphasized the necessity of discriminating between fantasy and reality when it comes to cyber risks.


Journal Entry #9
Justin White CS 201S
Social Media Disorder Scale (SMD Scale)
Please answer the question by thinking of your experience with using social media (e.g.,
WhatsApp, Snapchat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs)
in past year. Answer the questions as honestly as possible. According to DSM, at least five
(out of the nine) criteria must be met for a formal diagnosis of “disordered social media
user”. This is designed for personal insight and is not a substitute for professional diagnosis
or advice.
For each statement below, answer “Yes” or “No” based on your experiences over the past 12
months.
1. Preoccupation: – Do you frequently find yourself thinking about social media or
planning to use it? Yes/No
2. Tolerance: – Have you felt dissatisfied because you want to spend more time on social
media? Yes/No.
3. Withdrawal: – Do you feel restless, irritable, felt bad or upset when you are unable to
use social media? Yes/No.
4. Persistence: – Have you tried to spend less time on social media, but failed? Yes/No.
5. Displacement: – Regularly neglected other activities (i.e. hobbies, sports, homework)
because you wanted to use social media? Yes/No.
6. Problems: – Regularly had arguments with others because of your social media use?
Yes/No.
7. Deception: – Regularly lied to your parents or friends about the amount of time you
spend on social media? Yes/No.
8. Escape: – Do you use social media to forget about personal problems or to relieve
negative feelings such as guilt or anxiety? Yes/No.
9. Conflict: – Had serious conflict with parents, brother, sister (friends, relationships etc.)
because of your social media use? Yes/No.
Scoring
• Count the number of “Yes” answers.
• The scale involves summing the number of “Yes” answers; a score of 1 or lower
indicates normative social media usage, 2-5 indicates risky usage, and 6-9
indicates problematic usage.
Citation
van den Eijnden, R. J. J. M., Lemmens, J. S., & Valkenburg, P. M. (2016). The Social Media
Disorder Scale. Computers in Human Behavior, 61, 478–487.


Journal Entry #10

By Justin White

CYSE 201S

Professor Yalpi

April 3rd, 2025

The Importance of Social Cybersecurity

This article discusses how cyber warfare has gone from hacking to manipulating public opinion through propaganda. The “BEND” model provides a clear framework for comprehending these strategies, demonstrating how quickly disinformation may spread. I agree that dealing with these challenges involves a combination of technology, legislation, and education. It also emphasizes the notion that cybersecurity is more than just defending networks; it is also about protecting information integrity. This viewpoint is particularly pertinent now, as social media continues to play an important role in forming ideas. The paper makes a compelling case for why social cybersecurity should be a top priority for both national security and general digital awareness.


Journal Entry #11

By Justin White

CYSE 201S

Professor Yalpi

April 3rd, 2025

Human Nature and the Cybersecurity Analyst

The video emphasizes that being a cybersecurity analyst is more than just understanding technologies; it is also about understanding people. Much of the job entails detecting how common human behavior, such as clicking questionable links or repeating passwords, might pose security problems. Analysts must consider both the attacker and the user’s perspectives, predicting mistakes and developing safeguards to encourage safer choices. It’s not just behind-the-scenes work; there’s also a social aspect to the role, such as describing threats in layman’s terms and collaborating with others to foster a security culture. The human element is crucial to the profession, thus social awareness is equally important as technical expertise.

Journal Entry #12

By Justin White

CYSE 201S

Professor Yalpi

April 9th, 2025

Theories Behind Data Breaches

After reading the “SAMPLE DATA BREACH NOTIFICATION” from Glasswasherparts, various economic and psychological theories become evident. Economically, the concept of information asymmetry sticks out at first; the corporation knew about the breach, but customers were unaware. The delay in telling them might also be attributed to cost-benefit analysis, in which the corporation had to weigh the potential consequences versus cooperation with police enforcement. Psychologically, this type of incident influences how people perceive danger; receiving a letter like this might raise legitimate concerns about identity theft or fraud. It also relates to trust; when consumers provide their information to a corporation, they want it to be secure. A breach like this can feel like a betrayal, making it difficult to trust that firm again.


Journal Entry #13

By Justin White

CYSE 201S

Professor Yalpi

April 10th, 2025

Bug Bounties and Security

According to Sridhar and Ng’s research, bug bounty schemes represent a fascinating economic approach to cybersecurity. The literature analysis focuses on two primary rationales: assisting organizations in gaining access to scarce security talent (particularly important for SMEs facing a 4 million professional shortfall) and using Linus’ Law, which states that “more eyeballs” identify more vulnerabilities through various testing methods. In reviewing their findings, I was struck by security researchers’ low price elasticity (0.1-0.2), showing that we are motivated by reputation and learning possibilities rather than remuneration. Their discovery that corporate size and brand reputation have no influence on vulnerability reporting expands access to security expertise. Having worked with resource-constrained teams, I understand how these initiatives provide opportunity for firms that cannot otherwise afford specialized security professionals. The research clearly demonstrates how bug bounties generate economic incentives that link ethical hackers’ objectives with organizational security requirements.


Journal Entry #14

By Justin White

CYSE 201S

Professor Yalpi

April 16th, 2025

Five Serious Online Offenses and Their Impact

After reading Andriy Slynchuk’s piece, five online acts strike me as the most serious: torrenting, jailbreaking gadgets, sharing account passwords, cyberbullying, and hacking. I believe they are significant because they go beyond simply breaching the rules; they can harm real individuals. For example, cyberbullying can create long-term emotional harm, which I believe is generally underestimated online. Hacking and password sharing jeopardize personal data, which concerns me as someone who values privacy and digital security. Torrenting and jailbreaking may appear to be innocent, yet they undermine faith in creators and companies. These behaviors may have legal ramifications, but more importantly, they influence how safe and respectful the internet feels for everyone.


Journal Entry #15

By Justin White

CYSE 201S

Professor Yalpi

April 28th, 2025

Digital Forensics Social Connection

Davin Teo’s TEDx lecture demonstrated how digital forensics integrates technology and social science. His career began in accountancy, but he switched to cybersecurity after realizing he was more interested in the human behavior behind digital crimes. What struck me was that his job is more than just technical; it also involves a grasp of motivation, psychology, and criminals’ habits. This is related to social science concepts such as routine activity theory, which explains how crimes occur when motivated offenders identify vulnerable targets without protection. Teo’s ability to put together digital evidence demonstrates how important social understanding is in digital investigations. I found his story fascinating because it demonstrates how following your curiosity and combining multiple hobbies can lead to a meaningful, unexpected career path that still focuses on people and problem solving.